$ wget -O bison-3.7.4.tar.gz --ca-certificate=$HOME /cacerts/letsencrypt.pem https://ftp.gnu.org/gnu/bison/bison-3.7.4.tar.gz wget: unrecognized option: ca-certificate=/home/jwalton/cacerts/letsencrypt.pem BusyBox v1.31.1 () multi-call binary. Usage: wget [-c|--continue] [--spider] [-q|--quiet] [-O|--output-document FILE] [-o|--output-file FILE] [--header 'header: value'] [-Y|--proxy on/off] [-P DIR] [-S|--server-response] [-U|--user-agent AGENT] [-T SEC] URL... Retrieve files via HTTP or FTP --spider Only check URL existence: $? is 0 if exists -c Continue retrieval of aborted transfer -q Quiet -P DIR Save to DIR (default .) -S Show server response -T SEC Network read timeout is SEC seconds -O FILE Save to FILE ('-' for stdout) -o FILE Log messages to FILE -U STR Use STR for User-Agent header -Y on/off Use proxy This is probably CVE worthy... ----- $ uname -r 5.4.84-0-lts $ cat /etc/*release* 3.12.3 NAME="Alpine Linux" ID=alpine VERSION_ID=3.12.3 PRETTY_NAME="Alpine Linux v3.12" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://bugs.alpinelinux.org/"