Buffer Overflow in OmniHTTPd CGI Program

HIGH (10.0) No Patch (9553 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 4.58% chance of exploitation (percentile: 89%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

OmniHTTPd is a web server software that was widely used on older versions of Windows. This vulnerability allows remote attackers to execute commands by sending malicious HTTP requests to the server.

Am I affected?

You're affected if you use OmniHTTPd version 4.0 or earlier. Check with: find / -name "omnihttpd.exe" 2>/dev/null (Note: This command is specific to Windows systems, and its applicability might vary on other platforms.)

Affected Products

Microsoft / OmniHTTPd

How to fix

Upgrade to OmniHTTPd version 5.0 or later.
- Immediate mitigations:
- Disable CGI execution by setting the CGIExecution service to "Disabled" in the Windows Services console.
- Block HTTP requests from untrusted sources using a firewall.