Impact
A path traversal flaw exists in the WinCE Extraction Plugin’s read_null_terminated_string function, allowing any local user to manipulate the target file name argument and cause the plugin to resolve file paths outside the intended directory. The vulnerability can lead to reading arbitrary local files and therefore violates data confidentiality. The weakness is classified as CWE‑22.
Affected Systems
OSPG binwalk versions up to 2.4.3 are affected, and the project maintainer has terminated support for these releases. Users are directed to migrate to binwalk v3 or later, which removes the vulnerable plugin.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, implying limited public exploitation. The attack vector is strictly local; an attacker must have the ability to run binwalk on the target system to take advantage of the path traversal bug.
OpenCVE Enrichment