Command Injection in radare2 by radareorg
CVE-2026-40527

8.5HIGH

Key Information:

Vendor

Radareorg

Status
Vendor
CVE Published:
17 April 2026

What is CVE-2026-40527?

radare2 versions prior to a specific commit contain a command injection vulnerability in the afsv/afsvj command execution path. Attackers can exploit this weakness by crafting ELF binaries that contain malicious r2 command sequences disguised as DWARF DW_TAG_formal_parameter names. When the radare2 tool analyzes such binaries using the 'aaa' command followed by 'afsvj', it inadvertently executes these embedded shell commands. This vulnerability stems from a lack of sanitization, allowing arbitrary shell command execution through insufficiently validated parameter interpolation in the pfq command string.

Affected Version(s)

radare2 0

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Shota Zaizen
.