Skip to content
Threat Feed

Tag

Command-Injection

90 briefs RSS
critical advisory

Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability

CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.

Easy7 Integrated Management Platform cve-2026-7698 command-injection web-application
2r 1t 1c
critical advisory

OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)

A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.

p_69_branch_monkey_mcp command-injection web-application cve
2r 1t 1c
high advisory

Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability

CVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.

command-executor-mcp-server cve-2026-7593 command-injection webserver
2r 1t 1c
critical advisory

Totolink NR1800X Command Injection Vulnerability

A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.

NR1800X 9.1.0u.6279_B20210910 command-injection router network
2r 1t 1c
critical advisory

Synway SMG Gateway Management Software Unauthenticated OS Command Injection

Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.

SMG Gateway Management Software command-injection rce network
2r 1t 1c
high advisory

VetCoders mcp-server-semgrep OS Command Injection Vulnerability

VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.

mcp-server-semgrep 1.0.0 command-injection vulnerability mcp-server-semgrep
2r 1t 1c
critical advisory

PolarVista xcode-mcp-server OS Command Injection Vulnerability

PolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.

xcode-mcp-server 1.0.0 command-injection vulnerability xcode-mcp-server
2r 1t 1c
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

Totolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.

A8000RU cve-2026-7241 command-injection router
2r 1t 1c
critical advisory

Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)

A critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.

A8000RU command injection router vulnerability cve-2026-7244
3r 1t 1c
critical advisory

Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)

CVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.

A8000RU 7.1cu.643_b20200521 cve-2026-7240 command-injection totolink router cgi
2r 1t 1c
high threat

dvladimirov MCP Git Search API Command Injection Vulnerability

A command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.

exploited MCP command-injection vulnerability git-search-api
2r 1t 1c
critical advisory

Tenda HG3 2.0 Command Injection Vulnerability

Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.

HG3 2.0 command-injection cve-2026-7160 tenda
2r 1t 1c
high advisory

tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)

A command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.

ssh-mcp command-injection vulnerability
2r 1t 1c
high advisory

D-Link DIR-822 A_101 Command Injection via DHCP Hostname

A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.

DIR-822 A_101 command-injection dhcp iot
2r 1t 1c
high advisory

Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability

Toowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.

chatgpt-mcp-server cve-2026-7061 command-injection webserver
2r 1t 1c
critical advisory

Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)

CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.

MR9600 cve-2026-6992 command-injection router rce
2r 2t 1c
high advisory

PicoClaw Web Launcher Management Plane Command Injection Vulnerability

PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.

PicoClaw command-injection vulnerability web-application
2r 1t 1c
critical advisory

IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution

An unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.

Total Storage Service Console +1 cve-2026-5935 rce command injection
2r 1t 1c
critical advisory

WWBN AVideo Unauthenticated Remote Code Execution via test.php

WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.

cve-2026-41064 avideo rce command-injection
2r 2t 1c 1i
high advisory

FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)

FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.

command-injection freepbx graphql cve-2026-40520
2r 1t 1c
critical advisory

Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration

Dolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.

command-injection rce dolibarr
2r 1t 1c
critical advisory

Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)

Anviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.

command-injection unauthorized-access iot
2r 1t 1c
critical threat

Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)

A remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.

exploited qmail rce command-injection CVE-2026-41113
2r 3t 1c 1i
critical advisory

Flowise Authenticated Remote Code Execution via MCP Adapter

Flowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.

flowise rce command-injection
3r 1t
high advisory

Wavlink WL-WN530H4 OS Command Injection Vulnerability

A remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.

command-injection router cve-2026-6483
2r 2t 1c
critical advisory

Dell PowerProtect Data Domain Command Injection Vulnerability (CVE-2026-23778)

A command injection vulnerability in Dell PowerProtect Data Domain (CVE-2026-23778) could allow a remote, high-privileged attacker to gain root-level access.

cve-2026-23778 command-injection dell powerprotect
2r 3t 1c 1i
critical advisory

Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution

Multiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.

cisco-ise rce command-injection path-traversal
2r 3t 3c
high advisory

Radare2 Command Injection Vulnerability (CVE-2026-41015)

Radare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.

radare2 command-injection cve-2026-41015 linux
2r 1t 1c
critical advisory

Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)

Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.

cve command-injection fortinet
2r 1t 1c 1i
high advisory

Composer Command Injection via Malicious Perforce Repository

Composer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.

composer command-injection php
2r 1t
high advisory

CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability

CVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.

command-injection windows vulnerability
2r 2t 1c
critical advisory

UniFi Play Command Injection Vulnerability (CVE-2026-22563)

A malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.

command-injection unifi cve-2026-22563
2r 1t 1c 1i
critical advisory

PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution

A vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.

rce command-injection praisonai
2r 3t
high advisory

MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)

A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.

command-injection metagpt cve-2026-5974
2r 1t 1c
critical advisory

MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)

A remote command injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.

CVE-2026-5972 command-injection metagpt
2r 1t 1c
critical advisory

PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)

PraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.

cve-2026-40088 command-injection praisonai
2r 1t 1c 1i
critical advisory

D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)

A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.

command-injection d-link router cve-2026-5844
2r 1t 1c 2i
high advisory

UAC (Unix-like Artifacts Collector) Command Injection Vulnerability

UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.

command-injection vulnerability uac
2r 1t 1c
high advisory

parseusbs Unsanitized LNK File Command Injection Vulnerability

parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.

command injection lnk parseusbs cve-2026-40029
2r 1t 1c
high advisory

parseusbs OS Command Injection Vulnerability (CVE-2026-40030)

parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.

command-injection vulnerability linux
2r 1t 1c 1i
critical advisory

PraisonAI Vulnerable to OS Command Injection

PraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.

command-injection rce praisonai
2r 1t 1i
critical advisory

CoolerControl Command Injection Vulnerability (CVE-2026-5208)

CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.

command-injection privilege-escalation coolercontrol
2r 1t 1c
high advisory

Emissary OS Command Injection Vulnerability (CVE-2026-35581)

Emissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.

cve command injection emissary
2r 1t 1c
critical advisory

AWS Research and Engineering Studio OS Command Injection Vulnerability (CVE-2026-5707)

A remote authenticated attacker can execute arbitrary commands as root on the virtual desktop host by crafting a malicious session name in AWS Research and Engineering Studio (RES) versions 2025.03 through 2025.12.01 due to unsanitized input, leading to complete system compromise.

cve command-injection aws res
2r 1t 1c
critical advisory

Anthropic Claude Code CLI/SDK OS Command Injection Vulnerability

CVE-2026-35022 describes an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK that allows attackers with control over authentication settings to execute arbitrary commands, potentially leading to credential theft and environment variable exfiltration.

command-injection cve-2026-35022 anthropic claude
2r 2t 1c
high advisory

Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)

The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.

cve-2026-35021 command-injection anthropic
2r 1t 1c
high advisory

Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)

A remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.

cve-2026-5677 totolink command-injection network-device
2r 1t 1c
high advisory

OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)

A remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.

command-injection dcmtk cve-2026-5663 storescp
2r 1t 1c
high advisory

Budibase Command Injection Vulnerability in Bash Automation Step

A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.

command-injection rce budibase
2r 1t
critical advisory

Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)

A critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.

cve-2026-5485 command injection athena odbc linux
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)

A command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.

command injection cve-2026-35558 athena
2r 2t 1c
high advisory

Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)

A command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.

command-injection metasploit pymetasploit3
2r 1t 1c
critical advisory

Endian Firewall Command Injection Vulnerability (CVE-2026-34791)

Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.

command-injection rce vulnerability
2r 1t 1c
high advisory

DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)

DefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.

command-injection web-application cve-2026-5333
2r 2t 1c
high advisory

CVE-2026-33613: Remote Code Execution in generateSrpArray Function

CVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.

cve-2026-33613 rce command-injection
2r 1t 1c
high advisory

PraisonAI SubprocessSandbox Shell Escape via sh/bash

PraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '<command>'`.

sandbox-escape command-injection praisonai
2r 3t
high advisory

KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe

The KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.

kubeai command-injection kubernetes cloud
2r 1t
high advisory

IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability

Unauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.

command-injection rce cve-2026-1345
2r 1t 1c
high advisory

NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)

CVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.

cve-2026-24154 nvidia jetson initrd command injection privilege escalation
2r 5t 1c 1i
critical advisory

OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)

OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.

command-injection imessage openclaw
2r 1t 1c
critical advisory

Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)

A command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.

command-injection cve-2026-5176 totolink router
2r 1t 1c
critical advisory

baserCMS OS Command Injection Vulnerability (CVE-2026-21861)

baserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.

cve-2026-21861 command-injection webserver
2r 1t 1c
critical advisory

baserCMS OS Command Injection Vulnerability (CVE-2026-30877)

baserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.

basercms command-injection webserver
2r 1t 1c
critical advisory

Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)

Xiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.

CVE-2026-34005 command-injection xiongmai dvr nvr
2r 1t
critical advisory

Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)

A command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.

command-injection rce foreman
2r 1t
critical advisory

node-tesseract-ocr OS Command Injection Vulnerability

The node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.

command-injection nodejs tesseract-ocr cve-2026-26832
2r 1t 5i
critical advisory

Netcore Power 15AX Remote Command Execution Vulnerability

CVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.

command-injection rce vulnerability netcore router
2r 1t
critical advisory

pdf-image npm Package Command Injection Vulnerability (CVE-2026-26830)

The pdf-image npm package through version 2.0.0 is vulnerable to OS command injection via the pdfFilePath parameter due to improper sanitization, potentially leading to arbitrary code execution.

command-injection npm CVE-2026-26830 pdf
2r 1t 1i
high advisory

Blinko Pre-1.8.4 OS Command Injection Vulnerability

Blinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.

cve-2026-23882 command-injection blinko
2r 1t 4i
critical advisory

TOTOLINK X6000R Remote Command Injection Vulnerability

A remote command injection vulnerability exists in TOTOLINK X6000R routers, specifically versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826, allowing attackers to execute arbitrary commands via manipulation of the Hostname argument in the setLanCfg function.

totolink rce command-injection cve-2026-4611
2r 1t
high advisory

D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)

CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.

command-injection router legacy-device
2r 2t
critical advisory

Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)

An unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.

cve-2026-32968 joomla rce command-injection
2r 1t 3i
critical advisory

Linksys MR9600 SmartConnect OS Command Injection (CVE-2026-4558)

A remote OS command injection vulnerability exists in the Linksys MR9600 router version 2.0.6.206937, allowing attackers to execute arbitrary commands by manipulating specific function arguments via the SmartConnect.lua file.

CVE-2026-4558 linksys command-injection network-device
2r 1t
critical advisory

Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)

A critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.

zyxel router command injection cve-2026-13942 upnp
2r 1t
critical advisory

CVE-2022-2068 c_rehash Command Injection Vulnerability

CVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.

cve-2022-2068 command-injection c_rehash certificate-management
2r 1t 1c
high advisory

radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)

A command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.

radare2 command-injection CVE-2026-40517
2r 1t 1c
critical threat

Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7154)

A remote OS command injection vulnerability exists in the Totolink A8000RU router version 7.1cu.643_b20200521, allowing attackers to execute arbitrary commands by manipulating the 'tty_server' argument in the 'setAdvancedInfoShow' function.

exploited A8000RU 7.1cu.643_b20200521 cve-2026-7154 command-injection network-device
2r 2t 1c
high advisory

GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks

A vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.

GitPython code-execution git-hooks command-injection
2r 1t 1c
high advisory

GitPython Command Injection Vulnerability

GitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.

GitPython command-injection vulnerability
2r 1t
critical advisory

Evolver Remote Code Execution via Command Injection in `_extractLLM()`

A command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.

@evomap/evolver command-injection rce evolver
2r 1t
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

A remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.

A8000RU 7.1cu.643_b20200521 command-injection rce totolink
2r 1t 1c
critical advisory

Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)

A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.

HG3 2.0 300003070 command-injection router tenda
2r 1t 1c
high advisory

MiroFish Command Injection Vulnerability (CVE-2026-7058)

A command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.

MiroFish command-injection vulnerability ipc
2r 1t 1c
high advisory

mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)

An OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.

mcp-dnstwist command-injection vulnerability
2r 1t 1c
high advisory

LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints

Authenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.

litellm rce command-injection
2r 1t
critical advisory

Electerm Command Injection Vulnerability via runLinux Function

A command injection vulnerability exists in electerm's install.js due to insufficient validation in the runLinux() function, allowing attackers to execute arbitrary commands by manipulating remote release metadata.

electerm command-injection npm
2r 1t
high advisory

Aider-MCP Command Injection Vulnerability (CVE-2026-7316)

A command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.

aider-mcp command-injection vulnerability
2r 1t 1c
high advisory

GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)

A command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.

GitPilot-MCP command-injection web-application cve
2r 1t 1c
high advisory

FastlyMCP Command Injection Vulnerability (CVE-2026-7220)

A command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.

FastlyMCP command-injection cve-2026-7220 fastly-mcp
2r 1t 1c
high advisory

choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)

The choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.

simple-openstack-mcp command-injection vulnerability openstack
3r 1t 1c