top of page
perceptive_background_267k.jpg

An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, a…

Published:

3 maart 2026 om 23:00:00

Alert date:

4 maart 2026 om 17:01:21

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Network Infrastructure

An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e affecting the traceroute module. The vulnerability occurs when shlex.Split parses user input without proper validation, allowing remote attackers to inject arbitrary flags through the q parameter. Attackers can exploit this by injecting flags like -w and -q to cause Denial of Service conditions. The attack vector enables exhaustion of system resources leading to service disruption. This vulnerability affects the bird-lg-go looking glass application used for network diagnostics.

Technical details

Mitigation steps:

Affected products:

bird-lg-go

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page