Metrics
Affected Vendors & Products
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ospg
Ospg binwalk |
|
| Vendors & Products |
Ospg
Ospg binwalk |
Mon, 27 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | OSPG binwalk WinCE Extraction Plugin winceextract.py read_null_terminated_string path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T22:15:15.535Z
Reserved: 2026-04-27T08:31:20.082Z
Link: CVE-2026-7179
No data.
Status : Received
Published: 2026-04-27T23:16:03.660
Modified: 2026-04-27T23:16:03.660
Link: CVE-2026-7179
No data.
OpenCVE Enrichment
Updated: 2026-04-28T13:00:15Z