Jan 6, 2026·5 min read·3 visits
LibHyperHTTP, a popular embedded web server library, failed to validate header lengths before addition. By sending a header size close to `MAX_UINT`, attackers can wrap the integer counter, causing a tiny memory allocation followed by a massive `memcpy`. Result: Immediate heap corruption and RCE.
A critical integer overflow vulnerability in the LibHyperHTTP library allows remote attackers to trigger a heap buffer overflow via crafted HTTP headers, leading to potential Remote Code Execution (RCE).
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
LibHyperHTTP HyperSource | < 2.4.1 | 2.4.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-190 (Integer Overflow or Wraparound) |
| Attack Vector | Network (AV:N) |
| Impact | Critical (Confidentiality, Integrity, Availability) |
| CVSS v3.1 | 9.8 |
| Exploit Status | Proof of Concept Available |
| EPSS Score | 0.85 (High Probability) |
The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.