Impact
The vulnerability allows an attacker to embed shell commands within DWARF formal parameter names in ELF binaries. When radare2 performs analysis through the afsv or afsvj commands, the unsanitized parameter interpolation builds a command string that is executed by the system shell, resulting in arbitrary code execution. The weakness stems from unsanitized user-controlled input in a system command context, corresponding to CWE-78.
Affected Systems
Vendors: radareorg. Product: radare2. All released versions before the patch commit bc5a89033db3ecb5b1f7bf681fc6ba4dcfc14683 are affected, including any radare2 binaries built from source prior to this commit.
Risk and Exploitability
The CVSS score of 8.5 classifies the vulnerability as high severity. EPSS data is not available, so the probability of exploitation is unclear, but the vulnerability is not listed in CISA KEV. Based on the description, the likely attack vector requires the attacker to supply or otherwise cause a user or privileged process to run radare2 on a crafted ELF file; a local or privileged attacker would benefit most. The impact is full control of the system executing radare2.
OpenCVE Enrichment