High severity7.8NVD Advisory· Published Apr 22, 2026· Updated Apr 27, 2026
CVE-2026-40517
CVE-2026-40517
Description
radare2 prior to 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by crafting a malicious PDB file with newline characters in symbol names. Attackers can inject arbitrary radare2 commands through unsanitized symbol name interpolation in the flag rename command, which are then executed when a user runs the idp command against the malicious PDB file, enabling arbitrary OS command execution through radare2's shell execution operator.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- blog.calif.io/p/mad-bugs-discovering-a-0-day-in-zeronvdExploitThird Party Advisory
- github.com/radareorg/radare2/issues/25730nvdExploitIssue TrackingThird Party Advisory
- www.vulncheck.com/advisories/radare2-command-injection-via-pdb-parser-symbol-namesnvdThird Party Advisory
- github.com/radareorg/radare2/pull/25731nvdIssue Tracking
News mentions
1- A Deep Dive Into Attempted Exploitation of CVE-2023-33538Unit 42 · Apr 16, 2026