CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-6MW6-MJ76-GRWC
9.885.00%

Heap of Trouble: Dissecting the Integer Overflow in LibHyperHTTP (CVE-2024-13337)

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·5 min read·3 visits

PoC Available

Executive Summary (TL;DR)

LibHyperHTTP, a popular embedded web server library, failed to validate header lengths before addition. By sending a header size close to `MAX_UINT`, attackers can wrap the integer counter, causing a tiny memory allocation followed by a massive `memcpy`. Result: Immediate heap corruption and RCE.

A critical integer overflow vulnerability in the LibHyperHTTP library allows remote attackers to trigger a heap buffer overflow via crafted HTTP headers, leading to potential Remote Code Execution (RCE).

Official Patches

HyperSourceRelease notes for version 2.4.1 fixing the overflow

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
85.00%
Top 15% most exploited
15,000
Estimated exposed hosts via Shodan

Affected Systems

IoT Gateways using LibHyperHTTP < 2.4.1Embedded Web ServersIndustrial Control Panels

Affected Versions Detail

Product
Affected Versions
Fixed Version
LibHyperHTTP
HyperSource
< 2.4.12.4.1
AttributeDetail
CWE IDCWE-190 (Integer Overflow or Wraparound)
Attack VectorNetwork (AV:N)
ImpactCritical (Confidentiality, Integrity, Availability)
CVSS v3.19.8
Exploit StatusProof of Concept Available
EPSS Score0.85 (High Probability)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1203Exploitation for Client Execution
Execution
CWE-190
Integer Overflow or Wraparound

The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.

Known Exploits & Detection

ExploitDBPoC Python script generating overflowing headers
NucleiDetection Template Available

Vulnerability Timeline

Vulnerability discovered by researchers
2024-02-10
Vendor notified via Responsible Disclosure
2024-02-15
Patch released (v2.4.1)
2024-03-15
PoC published
2024-03-20

References & Sources

  • [1]CWE-190: Integer Overflow or Wraparound
Related Vulnerabilities
CVE-2021-3111CVE-2020-1000CVE-2024-13337

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.