Vulnerability Description
radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj command path where crafted ELF binaries can embed malicious r2 command sequences as DWARF DW_TAG_formal_parameter names. Attackers can craft a binary with shell commands in DWARF parameter names that execute when radare2 analyzes the binary with aaa and subsequently runs afsvj, allowing arbitrary shell command execution through the unsanitized parameter interpolation in the pfq command string.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/radareorg/radare2/commit/bc5a89033db3ecb5b1f7bf681fc6ba4dcfc1
- https://github.com/radareorg/radare2/pull/25821
- https://www.vulncheck.com/advisories/radare2-command-injection-via-dwarf-paramet
FAQ
What is CVE-2026-40527?
CVE-2026-40527 is a vulnerability with a CVSS score of 7.8 (HIGH). radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj command path where crafted ELF binaries can embed malicious r2 command sequences as DWARF DW_TAG_formal_par...
How severe is CVE-2026-40527?
CVE-2026-40527 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40527?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.