CVE-2026-40024
EUVD-2026-2075908.04.2026, 22:16
The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| sleuthkit | the_sleuth_kit | 𝑥 < 4.15.0 |
𝑥
= Vulnerable software versions