CVE-2026-26068

CRITICAL
2026-02-12 [email protected]
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 22:02 vuln.today
PoC Detected
Feb 25, 2026 - 15:47 vuln.today
Public exploit code
Patch Released
Feb 25, 2026 - 15:47 nvd
Patch available
CVE Published
Feb 12, 2026 - 22:16 nvd
CRITICAL 9.9

Description

emp3r0r is a stealth-focused C2 designed by Linux users for Linux environments. Prior to 3.21.1, untrusted agent metadata (Transport, Hostname) is accepted during check-in and later interpolated into tmux shell command strings executed via /bin/sh -c. This enables command injection and remote code execution on the operator host. This vulnerability is fixed in 3.21.1.

Analysis

Command injection in emp3r0r C2 framework before 3.21.1. Untrusted agent metadata (Transport, Hostname) injected into commands. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running emp3r0r and isolate affected C2 infrastructure from production networks. Within 7 days: Apply vendor patch to version 3.21.1 or later on all emp3r0r instances and validate deployment. …

Sign in for detailed remediation steps.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +50
POC: +20

Share

CVE-2026-26068 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy