Linkr File Delivery System Vulnerability

CRITICAL (9.6)

Threat Intelligence

Low Risk
EPSS Score: 0.08% chance of exploitation (percentile: 24%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Linkr is a lightweight file delivery system that downloads files from a webserver. This vulnerability allows an attacker to inject arbitrary files into a package distribution, potentially leading to remote code execution if the malicious binary or script is executed.

Am I affected?

You're affected if you use Linkr. Affected versions: 2.0.0 If you don't recognise this software, you're probably not affected.

How to fix

Upgrade to Linkr version 2.0.1 or later.
- For immediate mitigations:
- Avoid using .linkr files from untrusted sources (e.g., curl https://example.com/linkr-manifest).
- Manually verify manifest integrity before running extract with the command sha256sum linkr-manifest.
- Host manifests only on trusted servers until a fix is released.