The vulnerability is a memory amplification Denial of Service in the @sveltejs/kit package. The root cause lies in the deserialize_binary_form function located in packages/kit/src/runtime/form-utils.js. This function is responsible for parsing a custom binary format for form submissions. The vulnerability arises because the function reads a length field from the request payload and immediately allocates a memory buffer of that size without verifying if the request's total size (Content-Length) is consistent with the declared length. An attacker can exploit this by sending a request with a small body but a large value in the length field. This forces the server to allocate a large buffer, leading to memory exhaustion and a DoS condition. The provided patch addresses this by introducing two main changes. First, it adds checks to validate the lengths specified within the binary payload against the HTTP Content-Length header. Second, it refactors the data reading logic to accumulate incoming data into a list of smaller chunks and only allocates the final, large buffer after all the necessary data has been successfully received, thus preventing the premature, large memory allocation.