Symlink Following Vulnerability in npitre cramfs-tools by npitre
CVE-2026-8784
Key Information:
- Vendor
Npitre
- Status
- Vendor
- CVE Published:
- 18 May 2026
Badges
What is CVE-2026-8784?
A vulnerability exists in npitre cramfs-tools versions up to 2.2, specifically within the change_file_status function in cramfsck.c. This vulnerability enables symlink following, allowing an attacker with local access to exploit the system. A patch has been released (commit b4a3a695c9873f824907bd15659f2a6ac7667b4f) to address this issue, and users are strongly advised to apply it promptly to mitigate potential risks associated with unauthorized access.
Affected Version(s)
cramfs-tools 2.0
cramfs-tools 2.1
cramfs-tools 2.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
