| عنوان | OSPG binwalk (Python version) <= 2.4.3 Path Traversal |
|---|
| الوصف | A path traversal vulnerability exists in the binwalk WinCE ROM extraction plugin (winceextract.py) that allows arbitrary file write when extracting crafted WinCE ROM firmware images. This can be escalated to Remote Code Execution (RCE) by planting a malicious binwalk plugin that executes on subsequent binwalk runs.
Note: The affected repository (https://github.com/OSPG/binwalk) has been officially archived by its maintainers as of November 2024, with a public statement that this version will receive no further updates as development has shifted to the Rust-based binwalk v3. Due to the archived status, GitHub does not allow opening issues, pull requests, or security advisories on the repository. No security policy (SECURITY.md) or dedicated security contact exists for the Python version.
Despite this, I made a good-faith effort to notify the maintainer by sending a detailed vulnerability report via email to the repository owner's publicly listed address ([email protected]) on 10-04-2026. Screenshots of this notification are attached in the advisory/exploit url.
I am proceeding with public disclosure and CVE assignment because: (1) the repository is archived with no mechanism to report security issues (2) the maintainers have explicitly stated no patches will be released for this version (3) the same disclosure approach was followed by the original CVE-2022-4510 researcher, who noted "I did not find any security/coordinated disclosure policy or contact info" and reported publicly (4) despite being unmaintained, binwalk v2.4.3 (Python) remains the default binwalk command pre-installed on every Kali Linux installation and is actively used by hundreds of thousands of security professionals, CTF participants, and automated firmware analysis pipelines worldwide.
Users are advised to migrate to binwalk v3.x (Rust rewrite), which is not affected by this vulnerability due to its centralized Chroot path sanitization architecture. |
|---|
| المصدر | ⚠️ https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/binwalk_path_traversal.md |
|---|
| المستخدم | dhabaleshwar (UID 58737) |
|---|
| ارسال | 10/04/2026 05:55 PM (18 أيام منذ) |
|---|
| الاعتدال | 27/04/2026 10:31 AM (17 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 359781 [OSPG binwalk حتى 2.4.3 WinCE Extraction Plugin winceextract.py read_null_terminated_string self.file_name اجتياز الدليل] |
|---|
| النقاط | 20 |
|---|