Description
A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.
INFO
Published Date :
2026-04-27T22:15:15.535Z
Last Modified :
2026-04-29T14:04:08.019Z
Source :
VulDB
AFFECTED PRODUCTS
The following products are affected by CVE-2026-7179 vulnerability.
| Vendors | Products |
|---|---|
| Ospg |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-7179.