5 vulnerabilities classified as CWE-67 (Windows设备名处理不恰当). AI Chinese analysis included.
CWE-67 represents a critical input validation weakness where applications fail to properly sanitize or recognize reserved Windows device names, such as CON, AUX, PRN, COM1, and LPT1, within constructed file paths. Attackers typically exploit this vulnerability by injecting these special identifiers into user-supplied input fields, tricking the application into interpreting them as hardware devices rather than standard files. This manipulation often results in severe denial of service conditions, as the operating system may block access to the device, or lead to unintended information exposure if the application behaves unpredictably. To mitigate this risk, developers must implement rigorous input validation that explicitly rejects or escapes these reserved keywords before processing. Additionally, using safe path-handling libraries that abstract direct OS interactions can prevent the application from inadvertently resolving these dangerous names, ensuring robust defense against path traversal and device manipulation attacks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-27199 | Werkzeug safe_join() allows Windows special device names — werkzeug | 7.5AI | HighAI | 2026-02-21 |
| CVE-2026-21860 | Werkzeug safe_join() allows Windows special device names with compound extensions — werkzeug | 7.5 | - | 2026-01-08 |
| CVE-2025-66221 | Werkzeug safe_join() allows Windows special device names — werkzeug | - | - | 2025-11-29 |
| CVE-2024-51745 | Wasmtime doesn't fully sandbox all the Windows device filenames — wasmtime | 8.2AI | HighAI | 2024-11-05 |
| CVE-2024-35197 | gix refs and paths with reserved Windows device names access the devices — gitoxide | 5.4 | Medium | 2024-05-23 |
Vulnerabilities classified as CWE-67 (Windows设备名处理不恰当) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.