3 vulnerabilities classified as CWE-626 (空字节交互错误). AI Chinese analysis included.
CWE-626 represents a critical input validation weakness where software fails to properly handle null bytes during data transitions between different programming languages or system components. This vulnerability arises because null bytes serve as string terminators in C-based libraries but are treated as valid characters in languages like PHP or Perl. Attackers typically exploit this discrepancy by injecting null bytes into user-controlled input to truncate expected string processing, thereby bypassing security checks or manipulating file path resolutions. For instance, an attacker might append a null byte to a filename to trick a C-based backend into ignoring a malicious extension that a PHP frontend validated. To mitigate this risk, developers must implement strict input sanitization that explicitly rejects or escapes null bytes before processing. Additionally, using consistent data handling libraries and avoiding mixed-language interfaces where possible reduces the likelihood of representation mismatches that lead to such poisoning errors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-10773 | Linux kernel 安全漏洞 — kernel | 4.4 | Medium | 2020-09-10 |
| CVE-2019-17137 | NETGEAR AC1200 R6220 Smart WiFi Router 授权问题漏洞 — AC1200 | 8.8 | - | 2020-02-10 |
| CVE-2019-11936 | Facebook HHVM 缓冲区错误漏洞 — HHVM | 9.8 | - | 2019-12-04 |
Vulnerabilities classified as CWE-626 (空字节交互错误) represent 3 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.