Safety vulnerability ID: 54641
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of binwalk from 2.1.2b through 2.3.3 included are vulnerable to path traversal and remote code execution. By crafting a malicious PFS filesystem file, an attacker can trigger the PFS extractor when binwalk is run in extraction mode (-e), causing files to be extracted to arbitrary locations. The vulnerability is associated with src/binwalk/plugins/unpfs.py.
Latest version: 2.1.0
Firmware analysis tool
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application