Tag
Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.
OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)
2 rules 1 TTP 1 CVEA remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.
Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.
Totolink NR1800X Command Injection Vulnerability
2 rules 1 TTP 1 CVEA command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.
Synway SMG Gateway Management Software Unauthenticated OS Command Injection
2 rules 1 TTP 1 CVESynway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.
VetCoders mcp-server-semgrep OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEVetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.
PolarVista xcode-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEPolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.
Totolink A8000RU OS Command Injection Vulnerability
2 rules 1 TTP 1 CVETotolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.
Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)
3 rules 1 TTP 1 CVEA critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.
Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)
2 rules 1 TTP 1 CVECVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.
dvladimirov MCP Git Search API Command Injection Vulnerability
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.
Tenda HG3 2.0 Command Injection Vulnerability
2 rules 1 TTP 1 CVETenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.
tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.
D-Link DIR-822 A_101 Command Injection via DHCP Hostname
2 rules 1 TTP 1 CVEA command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.
Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEToowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.
Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)
2 rules 2 TTPs 1 CVECVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.
PicoClaw Web Launcher Management Plane Command Injection Vulnerability
2 rules 1 TTP 1 CVEPicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.
IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution
2 rules 1 TTP 1 CVEAn unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.
WWBN AVideo Unauthenticated Remote Code Execution via test.php
2 rules 2 TTPs 1 CVE 1 IOCWWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.
FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)
2 rules 1 TTP 1 CVEFreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.
Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration
2 rules 1 TTP 1 CVEDolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.
Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)
2 rules 1 TTP 1 CVEAnviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.
Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)
2 rules 3 TTPs 1 CVE 1 IOCA remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.
Flowise Authenticated Remote Code Execution via MCP Adapter
3 rules 1 TTPFlowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.
Wavlink WL-WN530H4 OS Command Injection Vulnerability
2 rules 2 TTPs 1 CVEA remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.
Dell PowerProtect Data Domain Command Injection Vulnerability (CVE-2026-23778)
2 rules 3 TTPs 1 CVE 1 IOCA command injection vulnerability in Dell PowerProtect Data Domain (CVE-2026-23778) could allow a remote, high-privileged attacker to gain root-level access.
Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution
2 rules 3 TTPs 3 CVEsMultiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.
Radare2 Command Injection Vulnerability (CVE-2026-41015)
2 rules 1 TTP 1 CVERadare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.
Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)
2 rules 1 TTP 1 CVE 1 IOCFortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.
Composer Command Injection via Malicious Perforce Repository
2 rules 1 TTPComposer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.
CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.
UniFi Play Command Injection Vulnerability (CVE-2026-22563)
2 rules 1 TTP 1 CVE 1 IOCA malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.
PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution
2 rules 3 TTPsA vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.
MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.
MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)
2 rules 1 TTP 1 CVEA remote command injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.
PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)
2 rules 1 TTP 1 CVE 1 IOCPraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.
D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)
2 rules 1 TTP 1 CVE 2 IOCsA command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.
UAC (Unix-like Artifacts Collector) Command Injection Vulnerability
2 rules 1 TTP 1 CVEUAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.
parseusbs Unsanitized LNK File Command Injection Vulnerability
2 rules 1 TTP 1 CVEparseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.
parseusbs OS Command Injection Vulnerability (CVE-2026-40030)
2 rules 1 TTP 1 CVE 1 IOCparseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.
PraisonAI Vulnerable to OS Command Injection
2 rules 1 TTP 1 IOCPraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.
CoolerControl Command Injection Vulnerability (CVE-2026-5208)
2 rules 1 TTP 1 CVECoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.
Emissary OS Command Injection Vulnerability (CVE-2026-35581)
2 rules 1 TTP 1 CVEEmissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.
AWS Research and Engineering Studio OS Command Injection Vulnerability (CVE-2026-5707)
2 rules 1 TTP 1 CVEA remote authenticated attacker can execute arbitrary commands as root on the virtual desktop host by crafting a malicious session name in AWS Research and Engineering Studio (RES) versions 2025.03 through 2025.12.01 due to unsanitized input, leading to complete system compromise.
Anthropic Claude Code CLI/SDK OS Command Injection Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-35022 describes an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK that allows attackers with control over authentication settings to execute arbitrary commands, potentially leading to credential theft and environment variable exfiltration.
Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)
2 rules 1 TTP 1 CVEThe Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.
Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)
2 rules 1 TTP 1 CVEA remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.
OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)
2 rules 1 TTP 1 CVEA remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.
Budibase Command Injection Vulnerability in Bash Automation Step
2 rules 1 TTPA command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.
Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)
2 rules 1 TTP 1 CVEA critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.
Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)
2 rules 2 TTPs 1 CVEA command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.
Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)
2 rules 1 TTP 1 CVEA command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.
Endian Firewall Command Injection Vulnerability (CVE-2026-34791)
2 rules 1 TTP 1 CVEEndian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.
DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)
2 rules 2 TTPs 1 CVEDefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.
CVE-2026-33613: Remote Code Execution in generateSrpArray Function
2 rules 1 TTP 1 CVECVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.
PraisonAI SubprocessSandbox Shell Escape via sh/bash
2 rules 3 TTPsPraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '<command>'`.
KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe
2 rules 1 TTPThe KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.
IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability
2 rules 1 TTP 1 CVEUnauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.
NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)
2 rules 5 TTPs 1 CVE 1 IOCCVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.
OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.
Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.
baserCMS OS Command Injection Vulnerability (CVE-2026-21861)
2 rules 1 TTP 1 CVEbaserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.
baserCMS OS Command Injection Vulnerability (CVE-2026-30877)
2 rules 1 TTP 1 CVEbaserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.
Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)
2 rules 1 TTPXiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.
Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)
2 rules 1 TTPA command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.
node-tesseract-ocr OS Command Injection Vulnerability
2 rules 1 TTP 5 IOCsThe node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.
Netcore Power 15AX Remote Command Execution Vulnerability
2 rules 1 TTPCVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.
pdf-image npm Package Command Injection Vulnerability (CVE-2026-26830)
2 rules 1 TTP 1 IOCThe pdf-image npm package through version 2.0.0 is vulnerable to OS command injection via the pdfFilePath parameter due to improper sanitization, potentially leading to arbitrary code execution.
Blinko Pre-1.8.4 OS Command Injection Vulnerability
2 rules 1 TTP 4 IOCsBlinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.
TOTOLINK X6000R Remote Command Injection Vulnerability
2 rules 1 TTPA remote command injection vulnerability exists in TOTOLINK X6000R routers, specifically versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826, allowing attackers to execute arbitrary commands via manipulation of the Hostname argument in the setLanCfg function.
D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)
2 rules 2 TTPsCVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.
Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)
2 rules 1 TTP 3 IOCsAn unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.
Linksys MR9600 SmartConnect OS Command Injection (CVE-2026-4558)
2 rules 1 TTPA remote OS command injection vulnerability exists in the Linksys MR9600 router version 2.0.6.206937, allowing attackers to execute arbitrary commands by manipulating specific function arguments via the SmartConnect.lua file.
Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)
2 rules 1 TTPA critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.
CVE-2022-2068 c_rehash Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.
radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.
Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7154)
2 rules 2 TTPs 1 CVEA remote OS command injection vulnerability exists in the Totolink A8000RU router version 7.1cu.643_b20200521, allowing attackers to execute arbitrary commands by manipulating the 'tty_server' argument in the 'setAdvancedInfoShow' function.
GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks
2 rules 1 TTP 1 CVEA vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.
GitPython Command Injection Vulnerability
2 rules 1 TTPGitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.
Evolver Remote Code Execution via Command Injection in `_extractLLM()`
2 rules 1 TTPA command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.
Totolink A8000RU OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEA remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.
Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.
MiroFish Command Injection Vulnerability (CVE-2026-7058)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.
mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)
2 rules 1 TTP 1 CVEAn OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.
LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints
2 rules 1 TTPAuthenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.
Electerm Command Injection Vulnerability via runLinux Function
2 rules 1 TTPA command injection vulnerability exists in electerm's install.js due to insufficient validation in the runLinux() function, allowing attackers to execute arbitrary commands by manipulating remote release metadata.
Aider-MCP Command Injection Vulnerability (CVE-2026-7316)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.
GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.
FastlyMCP Command Injection Vulnerability (CVE-2026-7220)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.
choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)
3 rules 1 TTP 1 CVEThe choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.