


Perceptive Security
SOC/SIEM Consultancy

An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, a…
Published:
3 maart 2026 om 23:00:00
Alert date:
4 maart 2026 om 17:01:21
Source:
nvd.nist.gov
Web Technologies, Network Infrastructure
An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e affecting the traceroute module. The vulnerability occurs when shlex.Split parses user input without proper validation, allowing remote attackers to inject arbitrary flags through the q parameter. Attackers can exploit this by injecting flags like -w and -q to cause Denial of Service conditions. The attack vector enables exhaustion of system resources leading to service disruption. This vulnerability affects the bird-lg-go looking glass application used for network diagnostics.
Technical details
Mitigation steps:
Affected products:
bird-lg-go
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-26514
https://github.com/xddxdd/bird-lg-go/commit/6187a4e3afce6d8c29568f8c72ca497d1f5a2b56
https://github.com/xddxdd/bird-lg-go/issues/136
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
