Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Argument Injection in Traceroute Module Allows Denial of Service |
Thu, 05 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xddxdd:bird-lg-go:*:*:*:*:*:go:*:* |
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xddxdd
Xddxdd bird-lg-go |
|
| Vendors & Products |
Xddxdd
Xddxdd bird-lg-go |
Wed, 04 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 | |
| Metrics |
cvssV3_1
|
Wed, 04 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. This can be exploited to cause a Denial of Service (DoS) by exhausting system resources. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-04T15:39:12.164Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26514
Updated: 2026-03-04T15:36:54.868Z
Status : Analyzed
Published: 2026-03-04T16:16:27.713
Modified: 2026-03-05T18:07:05.847
Link: CVE-2026-26514
No data.
OpenCVE Enrichment
Updated: 2026-04-16T14:00:19Z