Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application.
History

Tue, 21 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application.
Title Incorrect input validation on the Zervit portable HTTP/Web server
First Time appeared Zervit
Zervit portable Http Web Server
Weaknesses CWE-20
CPEs cpe:2.3:a:zervit:portable_http_web_server:0:*:*:*:*:*:*:*
Vendors & Products Zervit
Zervit portable Http Web Server
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2026-04-21T08:19:57.983Z

Updated: 2026-04-21T08:19:57.983Z

Reserved: 2025-12-01T14:33:41.665Z

Link: CVE-2025-13826

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T09:16:06.087

Modified: 2026-04-21T09:16:06.087

Link: CVE-2025-13826

cve-icon Redhat

No data.