Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radare
Radare radare2 |
|
| CPEs | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Radare
Radare radare2 |
Thu, 23 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | radare2 prior to 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by crafting a malicious PDB file with newline characters in symbol names. Attackers can inject arbitrary radare2 commands through unsanitized symbol name interpolation in the flag rename command, which are then executed when a user runs the idp command against the malicious PDB file, enabling arbitrary OS command execution through radare2's shell execution operator. | |
| Title | radare2 < 6.1.4 Command Injection via PDB Parser Symbol Names | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-23T16:24:25.301Z
Reserved: 2026-04-13T20:29:02.809Z
Link: CVE-2026-40517
Updated: 2026-04-23T13:51:30.976Z
Status : Analyzed
Published: 2026-04-22T22:16:31.183
Modified: 2026-04-27T17:04:26.420
Link: CVE-2026-40517
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:15:09Z