A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue.
[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2026-2016-25c24ad8",
"target": {
"file": "src/base64.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"52792127485649528244036212812212428830",
"244564151359647250887928497871014904392",
"115955599080429114479581435839942501856",
"95170179270789726670019671868863176974",
"269103852097483132054304021673304595826",
"312328059861139713655210597605284791393",
"107991829929071671895191781611185296507",
"95687358357388333917042706157950859799",
"62932264688856123081586427316957088109",
"257219420171226631020597467776581962138",
"9183316775992320691999527670894350686",
"245661019840773830542518271704366194304",
"275403775594647015951378639441853682732",
"295045554048778348793230885893916908448"
]
},
"signature_version": "v1",
"source": "https://github.com/happyfish100/libfastcommon/commit/82f66af3e252e3e137dba0c3891570f085e79adf"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2026-2016-2b969434",
"target": {
"file": "src/base64.c",
"function": "base64_decode"
},
"digest": {
"length": 1128.0,
"function_hash": "29041597499329794403442703817706983425"
},
"signature_version": "v1",
"source": "https://github.com/happyfish100/libfastcommon/commit/82f66af3e252e3e137dba0c3891570f085e79adf"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2016.json"