Browse all 16 CVE security advisories affecting BusyBox. AI-powered Chinese analysis, POCs, and references for each vulnerability.
BusyBox serves as a lightweight, modular Unix toolset embedded in millions of devices, providing essential command-line utilities in minimal space. Historically, vulnerabilities frequently involve command injection, buffer overflows, and improper input validation, often leading to remote code execution or privilege escalation. Its widespread deployment in IoT and embedded systems amplifies exposure risks. Notable incidents include multiple CVEs affecting versions before 1.30.0, where flaws in utilities like `httpd` and `ftpd` allowed unauthorized access. Despite its simplicity, BusyBox's security posture remains challenging due to its static compilation and limited patching cycles in embedded environments, making it a persistent target for exploitation.
This page lists every published CVE security advisory associated with BusyBox. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.