radare2 is vulnerable to denial of service. A heap-based buffer over-read in the r_egg_lang_parsechar
function in egg_lang.c
due to lack of input length validation, allows a remote attacker to crash the application, or potentially execute arbitrary code in the system.