CVE-2025-60876

BusyBox Wget: HTTP Header Injection & The Art of Request Splitting

Alon Barad
Alon Barad
Software Engineer

Jan 22, 2026·7 min read·6 visits

Executive Summary (TL;DR)

BusyBox `wget` < 1.38.0 trusts URL inputs a little too much. It fails to sanitize control characters (CR/LF) and raw spaces. If you can trick an application into passing a malicious URL to `wget`, you can split the HTTP request, inject headers (like `Cookie` or `Authorization`), and potentially bypass authentication or poison intermediate caches. Patch now or sanitize your inputs.

A critical input validation failure in BusyBox's `wget` implementation allows for CRLF injection and HTTP Request Splitting, enabling attackers to inject arbitrary headers or poison caches via crafted URLs.

Fix Analysis (1)

Technical Appendix

CVSS Score
6.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS Probability
0.05%
Top 83% most exploited

Affected Systems

BusyBox wgetEmbedded Linux FirmwareIoT Devices using BusyBoxAlpine Linux containers (older versions)OpenWrt (older versions)

Affected Versions Detail

Product
Affected Versions
Fixed Version
BusyBox wget
BusyBox
<= 1.37.01.38.0
AttributeDetail
CWE IDCWE-113
Attack VectorNetwork
CVSS Score6.5
ImpactIntegrity & Confidentiality
Exploit StatusPoC Available
ProtocolHTTP/1.1
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')

The product does not neutralize or incorrectly neutralizes CR and LF characters in HTTP headers.

Vulnerability Timeline

Vulnerability reported to BusyBox mailing list
2025-08-23
Patch submitted by researcher
2025-08-28
CVE-2025-60876 Published
2025-11-10

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.