CVE-2026-26157
Busybox: busybox: arbitrary file overwrite and potential code execution via incomplete path sanitization
CVSS Score
7.0
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.
| CWE | CWE-73 |
| Vendor | red hat |
| Product | red hat enterprise linux 6 |
| Published | Feb 11, 2026 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for red hat red hat enterprise linux 6
Be the first to know when new high vulnerabilities affecting red hat red hat enterprise linux 6 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Hardened Images
All versions affected References
Credits
Red Hat would like to thank Calil Khalil (Hakal) for reporting this issue.