CVE-2026-26514 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: March 5, 2026
bird-lg-go - Denial of Service
Overview
bird-lg-go before commit 6187a4e contains an argument injection caused by improper validation of user input in the traceroute module's q parameter, letting remote attackers cause denial of service by injecting arbitrary flags.
Severity & Score
Impact
Remote attackers can cause denial of service by exhausting system resources via injected flags.
Mitigation
Update to the version after commit 6187a4e or latest available version.
References
Social Media Activity(4 posts)
š CVE-2026-26514 - High (7.5) An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. ... š https://www.thehackerwire.com/vulnerability/CVE-2026-26514/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-26514 - High (7.5) An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. ... š https://www.thehackerwire.com/vulnerability/CVE-2026-26514/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-26514 - High (7.5) An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. ... š https://www.thehackerwire.com/vulnerability/CVE-2026-26514/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-26514 - High (7.5) An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. ... š https://www.thehackerwire.com/vulnerability/CVE-2026-26514/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-26514
- Severity
- High
- CVSS Score
- 7.5
- Type
- command_injection
- Status
- confirmed
- EPSS
- 0.0%
- Social Posts
- 4
CWE
- CWE-88
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H