A vulnerability categorized as critical has been discovered in OSPG binwalk up to 2.4.3. This vulnerability affects the function
read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is referenced as CVE-2026-7179. The attack can only be performed from a local environment. Furthermore, an exploit is available.
The project maintainer confirms this issue: “I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected.” The GitHub repository mentions, that “[u]sers and contributors should migrate to binwalk v3.”