NGINX Has a High-Risk Vulnerability: Server Can Be Compromised by Simply Sending a Specially Crafted HTTP Request
7 hour ago / Read about 0 minute
Author:小编   

F5's NGINX has been exposed to a high-risk vulnerability, CVE-2026-42945, which stems from a heap buffer overflow issue lurking in the scripting engine for 18 years. When the rewrite and set directives are executed consecutively, a flag bit transmission error leads to insufficient buffer allocation, allowing attackers to exploit this vulnerability for remote code execution. This vulnerability was first discovered by AI during code auditing and affects approximately 1.2 million NGINX servers worldwide that have the WebDAV module enabled, with 85% at risk of exposure. An official patch has been released for remediation, and users are advised to immediately upgrade to the latest version and disable unused functional modules.