Redir 3.3 contains a stack overflow vulnerability in the...
High severity
Unreviewed
Published
Feb 11, 2026
to the GitHub Advisory Database
•
Updated Feb 11, 2026
Description
Published by the National Vulnerability Database
Feb 11, 2026
Published to the GitHub Advisory Database
Feb 11, 2026
Last updated
Feb 11, 2026
Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.
References