Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Bird-LG-Go Traceroute Module Can Crash Due to Malicious Input
CVE-2026-26514
Summary
The Bird-LG-Go network software's traceroute feature can be exploited by attackers to cause a denial of service by entering malicious input, which can exhaust system resources. This vulnerability affects all versions of Bird-LG-Go before a specific update. To stay protected, ensure you're running the latest version of Bird-LG-Go.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| xddxdd | bird-lg-go | <= 1.4.1 | – |
Original title
An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject ar...
Original description
An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. This can be exploited to cause a Denial of Service (DoS) by exhausting system resources.
nvd CVSS3.1
7.5
Vulnerability type
CWE-88
- https://github.com/xddxdd/bird-lg-go/commit/6187a4e3afce6d8c29568f8c72ca497d1f5a... Patch
- https://github.com/xddxdd/bird-lg-go/issues/136 Exploit Issue Tracking Vendor Advisory
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026