Stack-based buffer overflow vulnerability in the filename sanitization logic of GNU Wget2. The flaw occurs when wget2 processes attacker-controlled URL paths while filename restriction options such as --restrict-file-names=windows, unix, or ascii are enabled. During sanitization, the application writes beyond a fixed 1024-byte stack buffer due to missing bounds checks. A specially crafted URL path or HTTP redirect can trigger memory corruption, resulting in a crash or potentially enabling further exploitation. The issue can be triggered remotely with no authentication, requiring only user interaction to invoke wget2.