CVE-2024-11858

A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing​
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2329102 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*

History

05 Aug 2025, 17:56

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2329102 - () https://bugzilla.redhat.com/show_bug.cgi?id=2329102 - Issue Tracking, Third Party Advisory
First Time Radare radare2
Radare
CPE cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
Summary
  • (es) Se encontró una falla en Radare2 que contiene una vulnerabilidad de inyección de comandos causada por una validación de entrada insuficiente al gestionar archivos de la aplicación Pebble. Las entradas manipuladas con fines malintencionados pueden inyectar comandos de shell durante el análisis de comandos, lo que genera un comportamiento no deseado durante el procesamiento de archivos.

15 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-15 14:15

Updated : 2025-08-05 17:56


NVD link : CVE-2024-11858

Mitre link : CVE-2024-11858

CVE.ORG link : CVE-2024-11858


JSON object : View

Products Affected

radare

  • radare2
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')