๐Ÿ” CVE Alert

CVE-2026-7179

MEDIUM 5.3

OSPG binwalk WinCE Extraction Plugin winceextract.py read_null_terminated_string path traversal

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.

CWE CWE-22
Vendor ospg
Product binwalk
Published Apr 27, 2026
Stay Ahead of the Next One

Get instant alerts for ospg binwalk

Be the first to know when new medium vulnerabilities affecting ospg binwalk are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

OSPG / binwalk
2.4.0 2.4.1 2.4.2 2.4.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359781 vuldb.com: https://vuldb.com/vuln/359781/cti vuldb.com: https://vuldb.com/submit/802228 github.com: https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/binwalk_path_traversal.md

Credits

๐Ÿ” dhabaleshwar (VulDB User) VulDB CNA Team