radare2 prior to 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by crafting a malicious PDB file with newline characters in symbol names. Attackers can inject arbitrary radare2 commands through unsanitized symbol name interpolation in the flag rename command, which are then executed when a user runs the idp command against the malicious PDB file, enabling arbitrary OS command execution through radare2's shell execution operator.
References
| Link | Resource |
|---|---|
| https://blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zero | Exploit Third Party Advisory |
| https://github.com/radareorg/radare2/issues/25730 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/radareorg/radare2/pull/25731 | Issue Tracking |
| https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-symbol-names | Third Party Advisory |
Configurations
History
27 Apr 2026, 17:04
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Radare
Radare radare2 |
|
| CPE | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* | |
| References | () https://blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zero - Exploit, Third Party Advisory | |
| References | () https://github.com/radareorg/radare2/issues/25730 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/radareorg/radare2/pull/25731 - Issue Tracking | |
| References | () https://www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-symbol-names - Third Party Advisory |
22 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 22:16
Updated : 2026-04-27 17:04
NVD link : CVE-2026-40517
Mitre link : CVE-2026-40517
CVE.ORG link : CVE-2026-40517
JSON object : View
Products Affected
radare
- radare2
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
