CVE-2026-26157 Overview
A path traversal vulnerability has been identified in BusyBox's archive extraction utilities. The flaw stems from incomplete path sanitization that allows an attacker to craft malicious archives which, when extracted under specific conditions, may write files outside the intended destination directory. This vulnerability can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.
Critical Impact
Exploitation of this vulnerability could allow attackers to overwrite critical system files, potentially leading to arbitrary code execution on affected systems running BusyBox.
Affected Products
- BusyBox archive extraction utilities (tar, unzip, cpio)
- Embedded Linux systems utilizing BusyBox
- IoT devices and appliances with BusyBox implementations
Discovery Timeline
- 2026-02-11 - CVE-2026-26157 published to NVD
- 2026-02-12 - Last updated in NVD database
Technical Details for CVE-2026-26157
Vulnerability Analysis
This vulnerability is classified under CWE-73 (External Control of File Name or Path), indicating that the archive extraction components in BusyBox fail to properly validate and sanitize file paths contained within archive entries. When processing specially crafted archives, the extraction utilities do not adequately filter path components such as ../ sequences or absolute paths, allowing files to be written outside the intended extraction directory.
The attack requires local access and user interaction (the user must extract the malicious archive), but no special privileges are needed for the attacker to craft the malicious archive. Successful exploitation can result in high impact to confidentiality, integrity, and availability of the affected system through arbitrary file overwrite capabilities.
Root Cause
The root cause lies in incomplete path sanitization within BusyBox's archival components. The extraction routines fail to properly normalize and validate destination paths before writing extracted files, allowing specially crafted archive entries to escape the intended extraction directory through path traversal sequences.
Attack Vector
The attack vector is local, requiring an attacker to either provide a malicious archive to a victim or compromise a source from which archives are downloaded. The exploitation sequence involves:
- An attacker crafts a malicious archive containing entries with path traversal sequences (e.g., ../../etc/crontab)
- A victim extracts the archive using BusyBox utilities such as tar, unzip, or cpio
- Due to insufficient path sanitization, files are written outside the intended extraction directory
- Sensitive system files can be overwritten, potentially enabling code execution through modification of configuration files, cron jobs, or other executable content
The vulnerability exploitation mechanism involves crafted archive entries that contain relative path traversal sequences. When extracted, these paths are not properly normalized, allowing writes to arbitrary locations on the filesystem. For detailed technical information, refer to the BusyBox commit archive.
Detection Methods for CVE-2026-26157
Indicators of Compromise
- Unexpected file modifications in system directories following archive extraction operations
- Presence of archive files containing suspicious path traversal patterns in entry names
- Unusual cron job entries or modified configuration files that appeared after extraction operations
- File system integrity check failures on critical system files
Detection Strategies
- Monitor file system write operations during archive extraction for paths containing ../ sequences
- Implement file integrity monitoring (FIM) on critical system files and directories
- Deploy endpoint detection rules that alert on archive extraction followed by writes to sensitive directories like /etc/, /usr/bin/, or other system paths
- Review logs for BusyBox archive utility invocations with subsequent suspicious file system activity
Monitoring Recommendations
- Enable audit logging for file system operations in sensitive directories
- Implement real-time monitoring of archive extraction processes on embedded and IoT systems
- Configure SentinelOne agents to detect and alert on path traversal patterns during file extraction operations
- Establish baseline file integrity checks for systems running BusyBox to detect unauthorized modifications
How to Mitigate CVE-2026-26157
Immediate Actions Required
- Update BusyBox to the latest patched version that addresses the path sanitization flaw
- Review and validate all archive sources before extraction on affected systems
- Implement file system permissions to limit write access to critical directories
- Consider using alternative archive extraction tools with proper path validation until patches are applied
Patch Information
A fix for this vulnerability has been committed to the BusyBox repository. The patch implements proper path sanitization to prevent traversal sequences from escaping the intended extraction directory. For patch details, see the BusyBox commit. Additional information is available through Red Hat's CVE page and Red Hat Bugzilla.
Workarounds
- Extract archives only in isolated directories with restricted parent directory access
- Use containerization or sandboxing when extracting untrusted archives to limit file system access
- Implement pre-extraction validation scripts that scan archive contents for path traversal patterns
- Apply restrictive file system permissions on systems running BusyBox to minimize impact of potential exploitation
# Example: Create a restricted extraction environment
mkdir -p /tmp/safe_extract
cd /tmp/safe_extract
# Set restrictive umask before extraction
umask 077
# Consider using chroot or namespace isolation for untrusted archives
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


