Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 21 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application. | |
| Title | Incorrect input validation on the Zervit portable HTTP/Web server | |
| First Time appeared |
Zervit
Zervit portable Http Web Server |
|
| Weaknesses | CWE-20 | |
| CPEs | cpe:2.3:a:zervit:portable_http_web_server:0:*:*:*:*:*:*:* | |
| Vendors & Products |
Zervit
Zervit portable Http Web Server |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-21T08:19:57.983Z
Reserved: 2025-12-01T14:33:41.665Z
Link: CVE-2025-13826
No data.
Status : Received
Published: 2026-04-21T09:16:06.087
Modified: 2026-04-21T09:16:06.087
Link: CVE-2025-13826
No data.
OpenCVE Enrichment
No data.
Weaknesses