NIXPKGS-2026-1180
GitHub issue
published on
Permalink
CVE-2026-40527
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
radare2 Command Injection via DWARF Parameter Names
radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj command path where crafted ELF binaries can embed malicious r2 command sequences as DWARF DW_TAG_formal_parameter names. Attackers can craft a binary with shell commands in DWARF parameter names that execute when radare2 analyzes the binary with aaa and subsequently runs afsvj, allowing arbitrary shell command execution through the unsanitized parameter interpolation in the pfq command string.
References
-
https://github.com/radareorg/radare2/pull/25821 issue-tracking
Ignored references (1)
-
https://www.vulncheck.com/advisories/radare2-command-injection-via-dwarf-parame… third-party-advisory
Affected products
radare2
- <bc5a89033db3ecb5b1f7bf681fc6ba4dcfc14683
Package maintainers
-
@arkivm Vikram Narayanan <vikram186@gmail.com>
-
@Mic92 Jörg Thalheim <joerg@thalheim.io>
-
@makefu Felix Richter <makefu@syntax-fehler.de>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@azahi Azat Bahawi <azat@bahawi.net>