CVE-2026-2016

medium

Description

A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue.

References

https://vuldb.com/?submit.743873

https://vuldb.com/?id.344598

https://vuldb.com/?ctiid.344598

https://github.com/happyfish100/libfastcommon/issues/55#issuecomment-3776757848

https://github.com/happyfish100/libfastcommon/issues/55#issue-3836362577

https://github.com/happyfish100/libfastcommon/issues/55

https://github.com/happyfish100/libfastcommon/commit/82f66af3e252e3e137dba0c3891570f085e79adf

https://github.com/happyfish100/libfastcommon/

Details

Source: Mitre, NVD

Published: 2026-02-06

Updated: 2026-02-06

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

CVSS v4

Base Score: 4.8

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00013