No advisories yet.
Solution
No solution given by the vendor.
Workaround
As a prevention measure, avoid extracting archives from untrusted sources using BusyBox utilities. If extraction of untrusted archives is necessary, perform it within a highly isolated and restricted environment, such as a container with a read-only root filesystem and minimal privileges, to limit the potential impact of arbitrary file overwrites.
Thu, 12 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 11 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files. | |
| Title | Busybox: busybox: arbitrary file overwrite and potential code execution via incomplete path sanitization | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-73 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-12T04:55:23.529Z
Reserved: 2026-02-11T17:05:41.991Z
Link: CVE-2026-26157
Updated: 2026-02-11T20:51:35.261Z
Status : Received
Published: 2026-02-11T21:16:21.400
Modified: 2026-02-11T21:16:21.400
Link: CVE-2026-26157
OpenCVE Enrichment
No data.