Quantum Networks CVE-2026-41036

| EUVD-2026-24077 HIGH
OS Command Injection (CWE-78)
2026-04-21 CERT-In GHSA-7f6p-98mw-r63r
8.7
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

3
Re-analysis Queued
Apr 21, 2026 - 16:22 vuln.today
cvss_changed
Analysis Generated
Apr 21, 2026 - 10:27 vuln.today
CVSS changed
Apr 21, 2026 - 10:22 NVD
8.7 (HIGH)

DescriptionNVD

This vulnerability exists in Quantum Networks router due to inadequate sanitization of user-supplied input in the management CLI interface. An authenticated remote attacker could exploit this vulnerability by injecting arbitrary OS commands on the targeted device.

Successful exploitation of this vulnerability could allow the attacker to perform remote code execution with root privileges on the targeted device.

AnalysisAI

Remote code execution in Quantum Networks router QN-I-470 allows authenticated attackers to execute arbitrary OS commands as root via command injection in the management CLI interface. The vulnerability stems from inadequate input sanitization, enabling low-privileged authenticated users to escalate privileges to root level. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all QN-I-470 deployments and document current firmware versions; restrict management CLI access to defined administrative accounts only and disable remote management if operationally feasible. Within 7 days: Implement network segmentation isolating management interfaces to restricted subnets; enforce multi-factor authentication for all administrative access; review access logs for unauthorized CLI activity. …

Sign in for detailed remediation steps.

Share

CVE-2026-41036 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy