Quantum Networks CVE-2026-41037

| EUVD-2026-24079 HIGH
OS Command Injection (CWE-78)
2026-04-21 CERT-In GHSA-whhc-f8fh-m5cr
8.7
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

4
Analysis Updated
Apr 21, 2026 - 11:27 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 21, 2026 - 11:22 vuln.today
cvss_changed
Analysis Generated
Apr 21, 2026 - 10:27 vuln.today
CVSS changed
Apr 21, 2026 - 10:22 NVD
8.7 (HIGH)

DescriptionNVD

This vulnerability exists in Quantum Networks router due to inadequate sanitization of user-supplied input in the management CLI interface. An authenticated remote attacker could exploit this vulnerability by injecting arbitrary OS commands on the targeted device.

Successful exploitation of this vulnerability could allow the attacker to perform remote code execution with root privileges on the targeted device.

AnalysisAI

Remote code execution with root privileges in Quantum Networks router QN-I-470 version 6.1.1.B1 allows adjacent network attackers to execute arbitrary OS commands through the management CLI interface via command injection. The vulnerability requires no authentication (CVSS PR:N) and exploits inadequate input sanitization (CWE-78). …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all QN-I-470 devices running version 6.1.1.B1 and document their network locations and dependencies. Within 7 days: Implement network segmentation to restrict management CLI access to authorized administrative networks only; apply access control lists to block non-admin traffic to management interfaces. …

Sign in for detailed remediation steps.

Share

CVE-2026-41037 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy