Impact
The vulnerability resides in BusyBox's archive extraction utilities, which fail to fully sanitize paths. An attacker can embed specially crafted archive entries that, when extracted, write to directories outside the intended extraction location. This results in arbitrary file overwrite and, if critical configuration or binary files are altered, can lead to remote code execution or system compromise. The weakness is a classic path traversal flaw (CWE‑73).
Affected Systems
The flaw affects BusyBox installations in Red Hat Enterprise Linux 6 and Red Hat Hardened Images. Any systems running these distributions with BusyBox's default archive extraction utilities exposed to untrusted archives are at risk.
Risk and Exploitability
The CVSS score is 7, indicating a high‑severity vulnerability. The EPSS score is below 1 %, suggesting that while exploitation is currently unlikely, the risk remains due to the high severity and lack of existing mitigations. The vulnerability is not listed in CISA's KEV catalog. Exploitation requires that an attacker be able to supply a malicious archive; therefore, limiting exposure to untrusted archives and applying isolation mitigations greatly reduces the risk.
OpenCVE Enrichment