Exploit-DB
[webapps] BusyBox 1.37.0 - Path Traversal
ATT&CK techniques detected
T1068Exploitation for Privilege Escalation
76%
“name _ _ = = " _ _ main _ _ " : print ( " = " * 70 ) print ( " busybox path traversal exploit - cve - 2026 - 26157 " ) print ( " author : calil khalil " ) print ( " = " * 70 ) # display technical analysis show _ technical _ details ( ) # create exploit exploit _ file = create _ e…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1556.003Pluggable Authentication Modules
67%
“check : strstr ( \ " / etc / pam. d /.. \ ", \ " /.. / \ " ) - > null " ) print ( " result : sanitization bypassed, symlink created with original target " ) print ( " \ nexploitation flow : " ) print ( " 1. archive contains : symlink ' sensitive _ data ' - > ' / etc / pam. d /.. …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
BusyBox 1.37.0 - Path Traversal