GNU Wget2, the modern replacement for the widely used download utility, has been affected by two serious security vulnerabilities that could be exploited by remote attackers. The flaws, tracked as CVE-2025-69194 and CVE-2025-69195, impact core file handling functionality and can turn normal download operations into security threats. The first issue is a path traversal vulnerability in how Wget2 processes Metalink v3 and v4 files. The tool does not properly validate file name values defined in these XML documents. By embedding directory traversal sequences or absolute paths, an attacker can force Wget2 to write files outside the intended download directory. This could result in overwriting or truncating files that the user has permission to modify, including configuration or startup files, potentially leading to code execution. The second vulnerability is a stack based buffer overflow related to filename sanitization options. When certain restriction settings are enabled, Wget2 attempts to store sanitized filenames in a fixed size buffer without adequate bounds checking. A specially crafted URL path or HTTP redirect can trigger a buffer overflow, causing the application to crash and possibly allowing further exploitation through memory corruption. Both vulnerabilities are remotely exploitable and do not require authentication. An attacker only needs to trick a user into downloading a malicious file or following a crafted link. Given Wget2’s frequent use in scripts and automated environments, these flaws pose a broader risk. Users and administrators are strongly advised to update Wget2 immediately to mitigate potential exploitation.
A critical vulnerability has been identified in PX4 Autopilot, widely used in drones and autonomous vehicles across global industries. Highlighted by Cybersecurity and Infrastructu...
Cybercriminals are now weaponizing legitimate hotel reservation data to trick travelers into surrendering their payment details. This "Reservation Hijack Scam" stands out b...
A serious security issue has been discovered in nginx-ui, which can allow attackers to take full control of a system. This vulnerability is tracked as CVE-2026-33026. The problem e...