CVE-2026-40527 PUBLISHED

radare2 Command Injection via DWARF Parameter Names

Assigner: VulnCheck
Reserved: 13.04.2026 Published: 17.04.2026 Updated: 17.04.2026

radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj command path where crafted ELF binaries can embed malicious r2 command sequences as DWARF DW_TAG_formal_parameter names. Attackers can craft a binary with shell commands in DWARF parameter names that execute when radare2 analyzes the binary with aaa and subsequently runs afsvj, allowing arbitrary shell command execution through the unsanitized parameter interpolation in the pfq command string.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.5

Product Status

Vendor radareorg
Product radare2
Versions Default: unaffected
  • affected from 0 to bc5a89033db3ecb5b1f7bf681fc6ba4dcfc14683 (excl.)

Credits

  • Shota Zaizen finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE