CVE-2026-7179

MEDIUM

OSPG binwalk WinCE Extraction Plugin winceextract.py read_null_terminated_string path traversal

Title source: cna
STIX 2.1

Description

A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.

Scores

CVSS v3 5.3
EPSS 0.0001
EPSS Percentile 2.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (4)
OSPG/binwalk 2.4.0
OSPG/binwalk 2.4.1
OSPG/binwalk 2.4.2
OSPG/binwalk 2.4.3
Published Apr 27, 2026
Tracked Since Apr 28, 2026