An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. This can be exploited to cause a Denial of Service (DoS) by exhausting system resources.
References
| Link | Resource |
|---|---|
| https://github.com/xddxdd/bird-lg-go/commit/6187a4e3afce6d8c29568f8c72ca497d1f5a2b56 | Patch |
| https://github.com/xddxdd/bird-lg-go/issues/136 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-04 16:16
Updated : 2026-03-05 18:07
NVD link : CVE-2026-26514
Mitre link : CVE-2026-26514
CVE.ORG link : CVE-2026-26514
JSON object : View
Products Affected
xddxdd
- bird-lg-go
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
