EUVD-2026-17903

| CVE-2026-34430 HIGH
2026-04-01 [email protected]
8.6
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
A
Scope
X

Lifecycle Timeline

3
Analysis Generated
Apr 01, 2026 - 14:22 vuln.today
EUVD ID Assigned
Apr 01, 2026 - 14:22 euvd
EUVD-2026-17903
CVE Published
Apr 01, 2026 - 14:16 nvd
HIGH 8.6

Description

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled.

Analysis

Sandbox escape in ByteDance Deer-Flow (pre-commit 92c7a20) enables remote attackers to execute arbitrary commands on the host system by exploiting incomplete shell semantics validation in bash tool handling. Attackers bypass regex-based input filters using directory traversal and relative paths to break sandbox isolation, read/modify host files, and invoke subprocesses with shell interpretation. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

24 hours: Identify all systems running ByteDance Deer-Flow (pre-commit 92c7a20 or earlier versions); disable or isolate Deer-Flow services pending remediation; audit logs for suspicious command execution patterns. 7 days: Monitor ByteDance security advisories for patch availability; implement network segmentation to restrict Deer-Flow process privileges and file system access; require manual code review bypass for automated workflows. …

Sign in for detailed remediation steps.

Priority Score

43
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +43
POC: 0

Share

EUVD-2026-17903 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy