Command Injection

1933 CVEs product

Monthly

CVE-2026-24887 HIGH PATCH This Week

Claude Code versions before 2.0.72 allow authenticated attackers to execute arbitrary commands by exploiting a command parsing defect that bypasses the execution confirmation prompt via malicious find command syntax. An attacker with the ability to inject untrusted content into a Claude Code context can trigger unintended command execution with high impact to confidentiality, integrity, and availability. No patch is currently available for affected deployments.

Command Injection AI / ML Claude Code
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-1802 HIGH This Week

Ziroom ZHOME A0101 version 1.0.1.0 contains a command injection vulnerability in the macAddrClone function that can be exploited remotely through manipulation of the macType parameter, allowing unauthenticated attackers to execute arbitrary commands. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response to disclosure requests. An attacker can leverage this flaw to achieve remote code execution with network access and no user interaction required.

Command Injection
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
2.1%
CVE-2025-52626 MEDIUM This Month

A Potential Command Injection vulnerability in HCL AION. An This can allow unintended command execution, potentially leading to unauthorized actions on the underlying system.This issue affects AION: 2.0 [CVSS 4.5 MEDIUM]

Command Injection Aion
NVD
CVSS 3.1
4.5
EPSS
0.1%
CVE-2026-22550 HIGH This Week

Authenticated command injection in WRC-X1500GS-B and WRC-X1500GSA-B routers enables logged-in users to execute arbitrary OS commands through specially crafted requests. An attacker with valid credentials can gain complete system control over the affected devices. No patch is currently available to remediate this vulnerability.

Command Injection
NVD
CVSS 4.0
8.6
EPSS
0.1%
CVE-2026-0383 HIGH This Week

Brocade Fabric OS contains a command injection vulnerability that allows authenticated local users with shell access to read sensitive files and command history due to insecure storage practices. An attacker with local privileges can exploit this to access confidential information stored on the system. No patch is currently available.

Command Injection Fabric Operating System
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24763 HIGH PATCH This Week

Command injection in OpenClaw's Docker sandbox execution allows authenticated users to manipulate the PATH environment variable and execute arbitrary commands within containers prior to version 2026.1.29. An attacker with valid credentials and ability to control environment variables could achieve code execution within the containerized AI assistant. A patch is available in version 2026.1.29 and later.

Docker Command Injection AI / ML Openclaw
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-23515 CRITICAL POC PATCH Act Now

Command injection in Signal K Server (maritime navigation) before 1.5.0 allows authenticated users to execute OS commands. EPSS 4.96% with PoC and patch available.

Command Injection Signal K Server
NVD GitHub
CVSS 3.1
9.9
EPSS
5.0%
CVE-2026-22229 HIGH PATCH This Week

Command injection in TP-Link Archer BE230 v1.2 and Deco BE25 v1.0 allows authenticated administrators to execute arbitrary OS commands by importing a malicious VPN configuration file. An attacker with admin access can achieve full device compromise, affecting network configuration, security posture, and service availability. Affected versions require patching to build 20251218 rel.70420 (BE230) or 20250822 (BE25).

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-22227 HIGH PATCH This Week

TP-Link Archer BE230 v1.2 firmware contains a command injection vulnerability in the configuration backup restoration function that allows authenticated administrators to execute arbitrary OS commands with full device privileges. An attacker with admin credentials can exploit this to completely compromise the router, affecting network configuration, security posture, and service availability. The vulnerability affects versions before 1.2.4 Build 20251218 rel.70420 and patches are available.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
7.2
EPSS
1.0%
CVE-2026-22226 HIGH PATCH This Week

Command injection in TP-Link Archer BE230 v1.2 firmware's VPN server configuration module allows authenticated administrators to execute arbitrary OS commands and achieve full device compromise. An attacker with admin credentials can exploit this vulnerability to completely override device settings, disrupt network operations, and gain unrestricted control over the router. A patch is available for versions prior to 1.2.4 Build 20251218 rel.70420.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
7.2
EPSS
1.0%
CVE-2026-22225 HIGH PATCH This Week

Command injection in Archer BE230 v1.2 firmware's VPN Connection Service allows authenticated administrators to execute arbitrary OS commands and achieve full device compromise. An attacker with admin credentials can exploit this vulnerability to manipulate device configuration, disrupt network security, and disable services. A patch is available in firmware version 1.2.4 Build 20251218 rel.70420 and later.

Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
7.2
EPSS
1.0%
CVE-2026-22224 HIGH PATCH This Week

TP-Link Archer BE230 v1.2 firmware contains an OS command injection vulnerability in the cloud communication interface that allows authenticated administrators to execute arbitrary commands with full device privileges. An attacker who compromises an admin account can gain complete control over the router, compromising its configuration, network security, and availability. A patch is available for versions prior to 1.2.4 Build 20251218 rel.70420.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
7.2
EPSS
1.0%
CVE-2026-22223 HIGH PATCH This Week

Arbitrary code execution in TP-Link Archer BE230 firmware v1.2 prior to build 20251218 rel.70420 allows authenticated adjacent attackers to inject OS commands and gain full administrative control of the device. Successful exploitation compromises device configuration, network security, and service availability. A patch is available.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2026-22222 HIGH PATCH This Week

Arbitrary command execution in TP-Link Archer BE230 firmware v1.2 before build 20251218 allows authenticated adjacent network attackers to achieve full device compromise through OS command injection in multiple code paths. Successful exploitation grants administrative control, enabling attackers to modify device configuration, compromise network security, and disrupt service availability. A patch is available for affected versions.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2026-22221 HIGH PATCH This Week

Authenticated adjacent network attackers can execute arbitrary OS commands on TP-Link Archer BE230 v1.2 devices prior to firmware build 20251218 rel.70420, gaining full administrative control and compromising device configuration and network security. This command injection vulnerability exists across multiple distinct code paths within the VPN module functionality. A firmware patch is available to remediate this issue.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2026-0631 HIGH PATCH This Week

Authenticated attackers on the same network segment can inject arbitrary OS commands into TP-Link Archer BE230 firmware versions before 1.2.4 Build 20251218, achieving full device compromise including administrative control. This command injection vulnerability in the VPN modules allows attackers to manipulate device configuration, disrupt network security, and disable services with high severity impact. A patch is available for affected users.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2026-0630 HIGH PATCH This Week

Authenticated adjacent attackers can execute arbitrary OS commands on TP-Link Archer BE230 v1.2 devices prior to firmware build 20251218 rel.70420, achieving full administrative control. This command injection vulnerability compromises device configuration, network security, and service availability. A patch is available.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2026-1770 PATCH Monitor

Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass.

RCE Command Injection
NVD
EPSS
0.0%
CVE-2025-9974 HIGH This Week

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. [CVSS 8.0 HIGH]

Command Injection RCE
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-24788 HIGH PATCH This Week

Authenticated command injection in RaspAP versions before 3.3.6 allows logged-in users to execute arbitrary operating system commands with full system privileges. The vulnerability requires valid credentials but presents no additional complexity barriers, making it a critical post-authentication risk for deployments where user access controls may be weak. No patch is currently available.

Command Injection
NVD GitHub
CVSS 3.0
8.8
EPSS
0.1%
CVE-2026-1735 MEDIUM This Month

Command injection in Yealink MeetingBar A30 (version 133.321.0.3) via the Diagnostic Handler component allows attackers with physical access to execute arbitrary commands with limited privileges. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. An attacker can achieve limited confidentiality, integrity, and availability impacts on affected devices.

Command Injection
NVD VulDB
CVSS 3.1
4.3
EPSS
0.7%
CVE-2020-37027 CRITICAL POC Act Now

Unauthenticated command injection in Sickbeard alpha media management application. EPSS 0.70% with PoC available.

Command Injection
NVD GitHub Exploit-DB
CVSS 3.1
9.8
EPSS
0.7%
CVE-2026-1723 This Week

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1498_B20250826.

Command Injection
NVD GitHub
EPSS
0.5%
CVE-2025-24293 PATCH Monitor

Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default.

PHP Command Injection
NVD GitHub
EPSS
0.2%
CVE-2026-1690 MEDIUM POC This Month

Command injection in Tenda HG10 firmware allows remote attackers with high privileges to execute arbitrary system commands via the sysCmd parameter in /boaform/formSysCmd. Public exploit code exists for this vulnerability, and no patch is currently available. An authenticated attacker can exploit this to achieve limited unauthorized access and potential system compromise.

Command Injection Hg10 Firmware
NVD GitHub VulDB
CVSS 3.1
4.7
EPSS
0.9%
CVE-2026-1689 HIGH POC This Week

Command injection in Tenda HG10 firmware's login interface allows unauthenticated remote attackers to execute arbitrary commands by manipulating the Host parameter in the checkUserFromLanOrWan function. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires no user interaction and can fully compromise affected devices through remote code execution.

Command Injection Hg10 Firmware
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
4.5%
CVE-2026-1687 HIGH POC This Week

Hg10 Firmware versions up to - contains a vulnerability that allows attackers to command injection (CVSS 7.3).

Command Injection Hg10 Firmware
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
5.3%
CVE-2026-22623 HIGH This Week

Authenticated command injection in HIKSEMI NAS devices allows privileged users to execute arbitrary commands through improper input validation on the device interface. Attackers with valid credentials can craft malicious messages to achieve unauthenticated code execution on affected systems. No patch is currently available for this vulnerability.

Command Injection RCE
NVD
CVSS 3.1
7.2
EPSS
0.0%
CVE-2025-26385 Monitor

LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 versions up to 14.1 is affected by command injection.

Command Injection
NVD
EPSS
0.2%
CVE-2026-22277 HIGH This Week

Dell UnityVSA versions 5.4 and prior allow local attackers with low privileges to achieve arbitrary command execution with root-level access through OS command injection. This vulnerability requires local access and no user interaction, enabling attackers to completely compromise affected systems. No patch is currently available.

Command Injection Unity Operating Environment
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21418 HIGH This Week

Dell Unity versions 5.5.2 and earlier suffer from an OS command injection vulnerability that allows local attackers with low privileges to execute arbitrary commands with root-level access. The flaw stems from improper input validation in command processing, enabling privilege escalation on affected systems. No patch is currently available for this vulnerability.

Command Injection Unity Operating Environment
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-1638 MEDIUM This Month

Command injection in Tenda AC21 firmware versions 1.1.1.1/1.dmzip/16.03.08.16 allows authenticated remote attackers to execute arbitrary commands via the dmzIp parameter in the mDMZSetCfg function. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available.

Command Injection Ac21 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.2%
CVE-2026-1665 This Week

A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path).

Docker Command Injection
NVD GitHub
EPSS
0.0%
CVE-2026-25063 HIGH PATCH This Week

Arbitrary code execution in gradle-completion versions up to 9.3.0 occurs when users perform Bash tab completion in directories with malicious Gradle build files, as the script fails to sanitize task names and descriptions. A local attacker can inject shell commands through backticks in task descriptions, which are executed automatically during completion without requiring the user to run any Gradle tasks. The vulnerability affects developers using Gradle with bash completion enabled.

Command Injection Gradle Completion
NVD GitHub
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-25046 LOW Monitor

Kimi Agent SDK is a set of libraries that expose the Kimi Code (Kimi CLI) agent runtime in applications. The vsix-publish.js and ovsx-publish.js scripts pass filenames to execSync() as shell command strings. [CVSS 2.9 LOW]

Command Injection RCE
NVD GitHub
CVSS 3.1
2.9
EPSS
0.0%
CVE-2026-24905 HIGH POC PATCH This Week

Inspektor Gadget versions prior to 0.48.1 allow local attackers with limited privileges to execute arbitrary commands during custom gadget image builds due to insufficient input sanitization in Makefile generation. An attacker who can control buildOptions parameters can inject shell commands that execute with the privileges of the build process. Public exploit code exists for this vulnerability.

Kubernetes Command Injection Inspektor Gadget Suse
NVD GitHub VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-1625 MEDIUM This Month

Command injection in D-Link DWR-M961 firmware version 1.1.47 allows authenticated remote attackers to execute arbitrary commands via manipulation of the action_value parameter in the SMS message handling function. The vulnerability requires valid credentials but no user interaction, and public exploit code is available. Affected systems can suffer unauthorized command execution, data theft, and potential device compromise.

D-Link Command Injection Dwr M961 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-1624 MEDIUM This Month

Command injection in D-Link DWR-M961 firmware through the /boafrm/formLtefotaUpgradeFibocom endpoint allows authenticated remote attackers to execute arbitrary commands by manipulating the fota_url parameter. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Command Injection Dwr M961 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-1623 MEDIUM POC This Month

Command injection in Totolik A7000R firmware through the setUpgradeFW function allows unauthenticated remote attackers to execute arbitrary commands via a malicious FileName parameter. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The device remains vulnerable as no patch is currently available.

Command Injection A7000r Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
2.1%
CVE-2026-1601 MEDIUM POC This Month

A7000R Firmware versions up to 4.1cu.4154 contains a vulnerability that allows attackers to command injection (CVSS 6.3).

Command Injection A7000r Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
8.3%
CVE-2026-1596 MEDIUM This Month

Command injection in D-Link DWR-M961 firmware (version 1.1.47) allows unauthenticated remote attackers to execute arbitrary commands through the fota_url parameter in the LTE firmware upgrade function. Public exploit code exists for this vulnerability, which requires low privileges but no user interaction to exploit. No patch is currently available for affected devices.

D-Link Command Injection Dwr M961 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-23571 MEDIUM This Month

TeamViewer DEX versions below 24.5 allow authenticated users with actioner privileges to execute arbitrary elevated commands on connected hosts through inadequate input validation in the 1E-Nomad-RunPkgStatusRequest instruction. An attacker with these credentials could inject malicious commands to gain unauthorized system access and control. The vulnerability requires user interaction and high-level privileges but carries a significant risk due to the potential for complete system compromise.

Command Injection Digital Employee Experience
NVD
CVSS 3.1
6.8
EPSS
0.1%
CVE-2026-1548 MEDIUM POC This Month

Command injection in Totolik A7000R firmware (version 4.1cu.4154) via the CloudACManualUpdateUserdata function allows authenticated remote attackers to execute arbitrary commands through a crafted url parameter. Public exploit code exists for this vulnerability and no patch is currently available.

Command Injection A7000r Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.8%
CVE-2026-1547 MEDIUM POC This Month

Command injection in Totolik A7000R firmware allows authenticated remote attackers to execute arbitrary commands through the plugin_name parameter in the setUnloadUserData function. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires network access and valid credentials but no user interaction.

Command Injection A7000r Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.8%
CVE-2026-1544 MEDIUM POC This Month

D-Link DIR-823X routers are vulnerable to remote command injection through the lan_gateway parameter in the /goform/set_mode function, allowing authenticated attackers to execute arbitrary OS commands. Public exploit code is available for this vulnerability, and affected devices are no longer receiving security updates from the vendor. The attack requires network access and valid credentials but has a low CVSS score of 6.3 due to limited impact scope.

D-Link Command Injection Dir 823x Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2022-40619 HIGH POC This Week

FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. [CVSS 7.7 HIGH]

Netgear Command Injection R7000 Firmware Xr300 Firmware R6230 Firmware +7
NVD
CVSS 3.1
7.7
EPSS
0.8%
CVE-2025-57283 HIGH PATCH This Week

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js. [CVSS 7.8 HIGH]

Node.js Command Injection Browserstack Local Redhat
NVD GitHub
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-1506 HIGH POC This Week

Unauthenticated remote attackers can inject arbitrary OS commands through the MAC filter configuration parameter in D-Link DIR-615 firmware version 4.10 and potentially earlier versions. Public exploit code exists for this vulnerability, and affected devices are no longer receiving security updates from D-Link. Successful exploitation grants complete system compromise with high impact to confidentiality, integrity, and availability.

D-Link PHP Command Injection Dir 615 Firmware
NVD VulDB
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-1505 HIGH POC This Week

Command injection in D-Link DIR-615 firmware via the /set_temp_nodes.php URL Filter component allows unauthenticated remote attackers to execute arbitrary OS commands. Public exploit code exists for this vulnerability, which affects legacy unsupported devices with a 7.2 CVSS score and no available patch.

D-Link PHP Command Injection Dir 615 Firmware
NVD VulDB
CVSS 3.1
7.2
EPSS
0.7%
CVE-2026-24841 CRITICAL POC PATCH Act Now

Dokploy self-hosted PaaS prior to 0.26.6 has a critical command injection vulnerability (CVSS 9.9) allowing authenticated users to execute arbitrary OS commands on the host.

Docker Command Injection Dokploy
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-1448 HIGH POC This Week

Remote code execution in D-Link DIR-615 firmware through os command injection via the ipaddr parameter in the Web Management Interface allows unauthenticated remote attackers to execute arbitrary commands. The vulnerability affects unsupported firmware versions up to 4.10, and public exploit code is available. No patch has been released by the vendor.

D-Link PHP Command Injection Dir 615 Firmware
NVD VulDB
CVSS 3.1
7.2
EPSS
0.5%
CVE-2025-14756 HIGH This Week

Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise. [CVSS 8.8 HIGH]

TP-Link Command Injection Archer Mr600 Firmware
NVD
CVSS 3.1
8.8
EPSS
0.3%
CVE-2016-15057 CRITICAL Emergency

Command injection in Apache Continuum (unsupported). EPSS 37.9% indicates active exploitation of this legacy CI/CD system. No patch available — product is end-of-life.

Apache Command Injection Continuum
NVD
CVSS 3.1
9.9
EPSS
37.9%
CVE-2026-1428 HIGH This Week

WellChoose's Single Sign-On Portal System contains an OS command injection vulnerability that allows authenticated users to execute arbitrary commands on the affected server. Attackers with valid credentials can exploit this flaw to achieve remote code execution with full system privileges. No patch is currently available for this high-severity vulnerability.

Command Injection Single Sign On Portal System
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1427 HIGH POC This Week

The WellChoose Single Sign-On Portal System contains an OS command injection vulnerability that allows authenticated users to execute arbitrary commands on the affected server. An attacker with valid credentials can bypass input validation to inject malicious OS commands, achieving full system compromise with high impact to confidentiality, integrity, and availability. No patch is currently available for this vulnerability.

Command Injection Single Sign On Portal System
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-1419 MEDIUM POC This Month

Dcs-700L Firmware versions up to 1.03.09 contains a vulnerability that allows attackers to command injection (CVSS 4.7).

D-Link Command Injection Dcs 700l Firmware
NVD VulDB
CVSS 3.1
4.7
EPSS
0.1%
CVE-2026-1414 MEDIUM POC This Month

Operation And Maintenance Security Management System versions up to 3.0.12. contains a vulnerability that allows attackers to command injection (CVSS 6.3).

Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-1413 MEDIUM This Month

Operation And Maintenance Security Management System versions up to 3.0.12. contains a security vulnerability (CVSS 6.3).

Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-1412 HIGH POC This Week

Operation And Maintenance Security Management System versions up to 3.0.12. contains a security vulnerability (CVSS 7.3).

Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-67264 HIGH POC This Week

An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710 [CVSS 7.8 HIGH]

Command Injection Note59 Pro Firmware Note59 Firmware
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24423 CRITICAL KEV THREAT Emergency

SmarterTools SmarterMail prior to build 9511 contains a second critical vulnerability (CVE-2026-24423) — an unauthenticated remote code execution flaw in the ConnectToHub API method. An attacker can redirect the SmarterMail server to connect to a malicious HTTP endpoint that serves OS commands for execution. KEV-listed with EPSS 29%, this is chainable with CVE-2026-23760 for complete server compromise.

RCE Command Injection Smartermail
NVD
CVSS 3.1
9.8
EPSS
29.3%
Threat
4.3
CVE-2021-47903 HIGH POC This Week

LiteSpeed Web Server Enterprise 5.4.11 contains an authenticated command injection vulnerability in the external app configuration interface. [CVSS 8.8 HIGH]

RCE Path Traversal Command Injection
NVD Exploit-DB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-0796 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices due to insufficient input validation. The vulnerability requires valid credentials to exploit but provides complete system compromise with high confidentiality, integrity, and availability impact. No patch is currently available for this issue.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2026-0795 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter devices via command injection in the web UI allows authenticated attackers to execute arbitrary system commands due to insufficient input validation. An attacker with valid credentials can inject malicious commands through user-supplied parameters to gain code execution on the affected device. No patch is currently available for this vulnerability.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2026-0787 CRITICAL Act Now

ALGO 8180 IP Audio Alerter has a command injection in the SAC interface (EPSS 0.68%) allowing remote code execution on the emergency notification device.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
9.8
EPSS
0.7%
CVE-2026-0786 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware results from insufficient input validation in the SCI module, allowing authenticated attackers to inject arbitrary commands and execute code with device privileges. The vulnerability affects Golang-based implementations and carries a high CVSS score of 8.8, with no patch currently available. Exploitation requires valid credentials but poses significant risk to networked audio alerting infrastructure.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.8%
CVE-2026-0785 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the API interface allows authenticated attackers to execute arbitrary system commands on affected devices due to insufficient input validation. The vulnerability has a high CVSS score of 8.8 and currently lacks a patch. With an EPSS score of 0.8%, exploitation is possible but not yet widely observed in the wild.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.8%
CVE-2026-0784 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on vulnerable devices due to insufficient input validation. An attacker with valid credentials can inject malicious commands through unsanitized user input to compromise the device and execute code with device privileges. No patch is currently available for this vulnerability.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2026-0783 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices through insufficient input validation. An attacker with valid credentials can inject malicious commands through unsanitized user input parameters to achieve code execution in the device context. No patch is currently available for this high-severity vulnerability.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2026-0782 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter devices through command injection in the web management interface allows authenticated attackers to execute arbitrary commands with device privileges. The vulnerability stems from insufficient input validation of user-supplied parameters passed to system calls. A patch is not currently available for this high-severity flaw affecting Golang-based firmware.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2026-0781 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices due to insufficient input validation. An attacker with valid credentials can exploit this vulnerability to achieve code execution in the device context. No patch is currently available for this high-severity vulnerability (CVSS 8.8).

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-0780 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware through command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices due to insufficient input validation. The vulnerability requires valid credentials to exploit but enables complete device compromise once authenticated. No patch is currently available for this high-severity flaw affecting the Golang-based firmware.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-0779 HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web interface allows authenticated attackers to execute arbitrary code on affected devices through insufficient input validation. The vulnerability requires valid credentials but no user interaction to exploit, presenting significant risk to networked audio alerting systems. No patch is currently available.

Golang RCE Command Injection 8180 Ip Audio Alerter Firmware
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2026-0766 HIGH This Week

Remote code execution in Open WebUI through the load_tool_module_by_id function allows authenticated attackers to execute arbitrary Python code due to insufficient input validation on user-supplied strings. An attacker with valid credentials can leverage this vulnerability to achieve code execution with service account privileges. No patch is currently available, making this a critical risk for deployed Open WebUI instances.

Python RCE Command Injection AI / ML Open Webui
NVD
CVSS 3.0
8.8
EPSS
0.6%
CVE-2026-0765 HIGH This Week

Remote code execution in Open WebUI's install_frontmatter_requirements function allows authenticated attackers to execute arbitrary commands on the host system by bypassing input validation in system call parameters. The vulnerability affects AI/ML deployments using Open WebUI and requires valid authentication credentials to exploit. No patch is currently available.

RCE Command Injection AI / ML Open Webui
NVD
CVSS 3.0
8.8
EPSS
0.6%
CVE-2026-0759 CRITICAL Act Now

Katana Network Development Starter Kit has a command injection in executeCommand enabling remote code execution through the development framework.

RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2026-0758 HIGH This Week

mcp-server-siri-shortcuts fails to validate the shortcutName parameter before using it in system calls, enabling local attackers with low-privileged code execution to inject arbitrary commands and escalate to service account privileges. This command injection vulnerability (CVE-2026-0758, CVSS 7.8) affects the AI/ML tool and currently lacks a patch. An attacker exploiting this flaw can execute arbitrary code with elevated privileges on the affected system.

Privilege Escalation Command Injection AI / ML
NVD
CVSS 3.0
7.8
EPSS
0.1%
CVE-2026-0757 HIGH This Week

MCP Manager for Claude Desktop is vulnerable to command injection through improperly validated MCP config objects, enabling remote attackers to escape the sandbox and execute arbitrary code on affected systems. The vulnerability requires user interaction such as visiting a malicious page or opening a malicious file, and currently lacks an available patch. An attacker can leverage this flaw to achieve code execution with medium integrity privileges in the context of the running process.

Command Injection AI / ML
NVD
CVSS 3.0
8.8
EPSS
0.1%
CVE-2026-0756 CRITICAL Act Now

github-kanban-mcp-server has a command injection in execAsync (EPSS 1.0%) enabling remote code execution on developer machines using the GitHub Kanban MCP integration.

Github RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2026-0755 CRITICAL Act Now

gemini-mcp-tool has a command injection in execAsync allowing remote code execution on systems using the Gemini AI MCP integration.

RCE Command Injection AI / ML
NVD
CVSS 3.0
9.8
EPSS
0.5%
CVE-2025-15063 CRITICAL Act Now

Ollama MCP Server has a command injection vulnerability in execAsync (EPSS 1.0%) allowing remote attackers to execute arbitrary commands on systems running the Ollama AI integration.

RCE Command Injection AI / ML Ollama
NVD
CVSS 3.0
9.8
EPSS
1.0%
CVE-2025-15061 CRITICAL PATCH Act Now

Framelink Figma MCP Server has a command injection vulnerability in fetchWithRetry (EPSS 1.4%) enabling remote code execution on developer machines using the MCP integration.

RCE Command Injection AI / ML
NVD GitHub
CVSS 3.0
9.8
EPSS
1.4%
CVE-2026-24132 CRITICAL PATCH Act Now

Orval TypeScript code generator versions 7.19+ have a command injection vulnerability allowing RCE through malicious OpenAPI specifications during code generation.

Command Injection Orval
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-21520 HIGH This Week

Unauthenticated attackers can remotely access sensitive information in Microsoft Copilot Studio due to improper access controls, requiring no authentication or user interaction. This network-based vulnerability exposes confidential data to unauthorized disclosure with no patch currently available.

Command Injection AI / ML Copilot Studio
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-56590 CRITICAL POC Act Now

Apryse HTML2PDF SDK through version 11.10 has a command injection vulnerability in the InsertFromURL function allowing remote code execution when converting HTML to PDF.

Command Injection RCE Html2pdf
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-1327 MEDIUM POC This Month

Totolik NR1800X firmware versions up to 9.1.0u.6279_B20210910 contain a command injection vulnerability in the setTracerouteCfg function that allows authenticated remote attackers to execute arbitrary commands via malicious POST requests. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker with valid credentials can leverage this to achieve remote code execution on affected network devices.

Command Injection Nr1800x Firmware
NVD VulDB
CVSS 3.1
6.3
EPSS
0.7%
CVE-2026-1326 MEDIUM POC This Month

Command injection in Totolik NR1800X firmware allows authenticated remote attackers to execute arbitrary commands through the Hostname parameter in the setWanCfg POST handler. Public exploit code exists for this vulnerability, creating elevated risk despite no patch availability. Affected devices can be compromised to gain full system control with network access and valid credentials.

Command Injection Nr1800x Firmware
NVD VulDB
CVSS 3.1
6.3
EPSS
2.7%
CVE-2026-1324 HIGH POC This Week

Operation And Maintenance Security Management System versions up to 3.0.12. is affected by command injection (CVSS 8.8).

Ssh Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-23699 HIGH This Week

Unauthenticated attackers can execute arbitrary OS commands on AP180 series devices running firmware versions before AP_RGOS 11.9(4)B1P8 through a command injection vulnerability. This allows complete system compromise including data theft, modification, and availability disruption. No patch is currently available.

Command Injection
NVD
CVSS 3.0
7.2
EPSS
0.3%
CVE-2026-0933 CRITICAL PATCH Act Now

Cloudflare Wrangler CLI has a CVSS 9.9 command injection vulnerability in the 'wrangler pages deploy' command that allows arbitrary code execution during deployment.

Command Injection Wrangler
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-24887
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Claude Code versions before 2.0.72 allow authenticated attackers to execute arbitrary commands by exploiting a command parsing defect that bypasses the execution confirmation prompt via malicious find command syntax. An attacker with the ability to inject untrusted content into a Claude Code context can trigger unintended command execution with high impact to confidentiality, integrity, and availability. No patch is currently available for affected deployments.

Command Injection AI / ML Claude Code
NVD GitHub
CVE-2026-1802
EPSS 2% CVSS 7.3
HIGH This Week

Ziroom ZHOME A0101 version 1.0.1.0 contains a command injection vulnerability in the macAddrClone function that can be exploited remotely through manipulation of the macType parameter, allowing unauthenticated attackers to execute arbitrary commands. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response to disclosure requests. An attacker can leverage this flaw to achieve remote code execution with network access and no user interaction required.

Command Injection
NVD GitHub VulDB
CVE-2025-52626
EPSS 0% CVSS 4.5
MEDIUM This Month

A Potential Command Injection vulnerability in HCL AION. An This can allow unintended command execution, potentially leading to unauthorized actions on the underlying system.This issue affects AION: 2.0 [CVSS 4.5 MEDIUM]

Command Injection Aion
NVD
CVE-2026-22550
EPSS 0% CVSS 8.6
HIGH This Week

Authenticated command injection in WRC-X1500GS-B and WRC-X1500GSA-B routers enables logged-in users to execute arbitrary OS commands through specially crafted requests. An attacker with valid credentials can gain complete system control over the affected devices. No patch is currently available to remediate this vulnerability.

Command Injection
NVD
CVE-2026-0383
EPSS 0% CVSS 7.8
HIGH This Week

Brocade Fabric OS contains a command injection vulnerability that allows authenticated local users with shell access to read sensitive files and command history due to insecure storage practices. An attacker with local privileges can exploit this to access confidential information stored on the system. No patch is currently available.

Command Injection Fabric Operating System
NVD
CVE-2026-24763
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Command injection in OpenClaw's Docker sandbox execution allows authenticated users to manipulate the PATH environment variable and execute arbitrary commands within containers prior to version 2026.1.29. An attacker with valid credentials and ability to control environment variables could achieve code execution within the containerized AI assistant. A patch is available in version 2026.1.29 and later.

Docker Command Injection AI / ML +1
NVD GitHub
CVE-2026-23515
EPSS 5% CVSS 9.9
CRITICAL POC PATCH Act Now

Command injection in Signal K Server (maritime navigation) before 1.5.0 allows authenticated users to execute OS commands. EPSS 4.96% with PoC and patch available.

Command Injection Signal K Server
NVD GitHub
CVE-2026-22229
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Command injection in TP-Link Archer BE230 v1.2 and Deco BE25 v1.0 allows authenticated administrators to execute arbitrary OS commands by importing a malicious VPN configuration file. An attacker with admin access can achieve full device compromise, affecting network configuration, security posture, and service availability. Affected versions require patching to build 20251218 rel.70420 (BE230) or 20250822 (BE25).

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-22227
EPSS 1% CVSS 7.2
HIGH PATCH This Week

TP-Link Archer BE230 v1.2 firmware contains a command injection vulnerability in the configuration backup restoration function that allows authenticated administrators to execute arbitrary OS commands with full device privileges. An attacker with admin credentials can exploit this to completely compromise the router, affecting network configuration, security posture, and service availability. The vulnerability affects versions before 1.2.4 Build 20251218 rel.70420 and patches are available.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-22226
EPSS 1% CVSS 7.2
HIGH PATCH This Week

Command injection in TP-Link Archer BE230 v1.2 firmware's VPN server configuration module allows authenticated administrators to execute arbitrary OS commands and achieve full device compromise. An attacker with admin credentials can exploit this vulnerability to completely override device settings, disrupt network operations, and gain unrestricted control over the router. A patch is available for versions prior to 1.2.4 Build 20251218 rel.70420.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-22225
EPSS 1% CVSS 7.2
HIGH PATCH This Week

Command injection in Archer BE230 v1.2 firmware's VPN Connection Service allows authenticated administrators to execute arbitrary OS commands and achieve full device compromise. An attacker with admin credentials can exploit this vulnerability to manipulate device configuration, disrupt network security, and disable services. A patch is available in firmware version 1.2.4 Build 20251218 rel.70420 and later.

Command Injection Archer Be230 Firmware
NVD
CVE-2026-22224
EPSS 1% CVSS 7.2
HIGH PATCH This Week

TP-Link Archer BE230 v1.2 firmware contains an OS command injection vulnerability in the cloud communication interface that allows authenticated administrators to execute arbitrary commands with full device privileges. An attacker who compromises an admin account can gain complete control over the router, compromising its configuration, network security, and availability. A patch is available for versions prior to 1.2.4 Build 20251218 rel.70420.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-22223
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Arbitrary code execution in TP-Link Archer BE230 firmware v1.2 prior to build 20251218 rel.70420 allows authenticated adjacent attackers to inject OS commands and gain full administrative control of the device. Successful exploitation compromises device configuration, network security, and service availability. A patch is available.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-22222
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Arbitrary command execution in TP-Link Archer BE230 firmware v1.2 before build 20251218 allows authenticated adjacent network attackers to achieve full device compromise through OS command injection in multiple code paths. Successful exploitation grants administrative control, enabling attackers to modify device configuration, compromise network security, and disrupt service availability. A patch is available for affected versions.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-22221
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Authenticated adjacent network attackers can execute arbitrary OS commands on TP-Link Archer BE230 v1.2 devices prior to firmware build 20251218 rel.70420, gaining full administrative control and compromising device configuration and network security. This command injection vulnerability exists across multiple distinct code paths within the VPN module functionality. A firmware patch is available to remediate this issue.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-0631
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Authenticated attackers on the same network segment can inject arbitrary OS commands into TP-Link Archer BE230 firmware versions before 1.2.4 Build 20251218, achieving full device compromise including administrative control. This command injection vulnerability in the VPN modules allows attackers to manipulate device configuration, disrupt network security, and disable services with high severity impact. A patch is available for affected users.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-0630
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Authenticated adjacent attackers can execute arbitrary OS commands on TP-Link Archer BE230 v1.2 devices prior to firmware build 20251218 rel.70420, achieving full administrative control. This command injection vulnerability compromises device configuration, network security, and service availability. A patch is available.

TP-Link Command Injection Archer Be230 Firmware
NVD
CVE-2026-1770
EPSS 0%
PATCH Monitor

Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass.

RCE Command Injection
NVD
CVE-2025-9974
EPSS 0% CVSS 8.0
HIGH This Week

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. [CVSS 8.0 HIGH]

Command Injection RCE
NVD
CVE-2026-24788
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Authenticated command injection in RaspAP versions before 3.3.6 allows logged-in users to execute arbitrary operating system commands with full system privileges. The vulnerability requires valid credentials but presents no additional complexity barriers, making it a critical post-authentication risk for deployments where user access controls may be weak. No patch is currently available.

Command Injection
NVD GitHub
CVE-2026-1735
EPSS 1% CVSS 4.3
MEDIUM This Month

Command injection in Yealink MeetingBar A30 (version 133.321.0.3) via the Diagnostic Handler component allows attackers with physical access to execute arbitrary commands with limited privileges. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. An attacker can achieve limited confidentiality, integrity, and availability impacts on affected devices.

Command Injection
NVD VulDB
CVE-2020-37027
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

Unauthenticated command injection in Sickbeard alpha media management application. EPSS 0.70% with PoC available.

Command Injection
NVD GitHub Exploit-DB
CVE-2026-1723
EPSS 1%
This Week

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1498_B20250826.

Command Injection
NVD GitHub
CVE-2025-24293
EPSS 0%
PATCH Monitor

Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default.

PHP Command Injection
NVD GitHub
CVE-2026-1690
EPSS 1% CVSS 4.7
MEDIUM POC This Month

Command injection in Tenda HG10 firmware allows remote attackers with high privileges to execute arbitrary system commands via the sysCmd parameter in /boaform/formSysCmd. Public exploit code exists for this vulnerability, and no patch is currently available. An authenticated attacker can exploit this to achieve limited unauthorized access and potential system compromise.

Command Injection Hg10 Firmware
NVD GitHub VulDB
CVE-2026-1689
EPSS 5% CVSS 7.3
HIGH POC This Week

Command injection in Tenda HG10 firmware's login interface allows unauthenticated remote attackers to execute arbitrary commands by manipulating the Host parameter in the checkUserFromLanOrWan function. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires no user interaction and can fully compromise affected devices through remote code execution.

Command Injection Hg10 Firmware
NVD GitHub VulDB
CVE-2026-1687
EPSS 5% CVSS 7.3
HIGH POC This Week

Hg10 Firmware versions up to - contains a vulnerability that allows attackers to command injection (CVSS 7.3).

Command Injection Hg10 Firmware
NVD GitHub VulDB
CVE-2026-22623
EPSS 0% CVSS 7.2
HIGH This Week

Authenticated command injection in HIKSEMI NAS devices allows privileged users to execute arbitrary commands through improper input validation on the device interface. Attackers with valid credentials can craft malicious messages to achieve unauthenticated code execution on affected systems. No patch is currently available for this vulnerability.

Command Injection RCE
NVD
CVE-2025-26385
EPSS 0%
Monitor

LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 versions up to 14.1 is affected by command injection.

Command Injection
NVD
CVE-2026-22277
EPSS 0% CVSS 7.8
HIGH This Week

Dell UnityVSA versions 5.4 and prior allow local attackers with low privileges to achieve arbitrary command execution with root-level access through OS command injection. This vulnerability requires local access and no user interaction, enabling attackers to completely compromise affected systems. No patch is currently available.

Command Injection Unity Operating Environment
NVD
CVE-2026-21418
EPSS 0% CVSS 7.8
HIGH This Week

Dell Unity versions 5.5.2 and earlier suffer from an OS command injection vulnerability that allows local attackers with low privileges to execute arbitrary commands with root-level access. The flaw stems from improper input validation in command processing, enabling privilege escalation on affected systems. No patch is currently available for this vulnerability.

Command Injection Unity Operating Environment
NVD
CVE-2026-1638
EPSS 0% CVSS 6.3
MEDIUM This Month

Command injection in Tenda AC21 firmware versions 1.1.1.1/1.dmzip/16.03.08.16 allows authenticated remote attackers to execute arbitrary commands via the dmzIp parameter in the mDMZSetCfg function. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available.

Command Injection Ac21 Firmware
NVD GitHub VulDB
CVE-2026-1665
EPSS 0%
This Week

A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path).

Docker Command Injection
NVD GitHub
CVE-2026-25063
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Arbitrary code execution in gradle-completion versions up to 9.3.0 occurs when users perform Bash tab completion in directories with malicious Gradle build files, as the script fails to sanitize task names and descriptions. A local attacker can inject shell commands through backticks in task descriptions, which are executed automatically during completion without requiring the user to run any Gradle tasks. The vulnerability affects developers using Gradle with bash completion enabled.

Command Injection Gradle Completion
NVD GitHub
CVE-2026-25046
EPSS 0% CVSS 2.9
LOW Monitor

Kimi Agent SDK is a set of libraries that expose the Kimi Code (Kimi CLI) agent runtime in applications. The vsix-publish.js and ovsx-publish.js scripts pass filenames to execSync() as shell command strings. [CVSS 2.9 LOW]

Command Injection RCE
NVD GitHub
CVE-2026-24905
EPSS 0% CVSS 7.8
HIGH POC PATCH This Week

Inspektor Gadget versions prior to 0.48.1 allow local attackers with limited privileges to execute arbitrary commands during custom gadget image builds due to insufficient input sanitization in Makefile generation. An attacker who can control buildOptions parameters can inject shell commands that execute with the privileges of the build process. Public exploit code exists for this vulnerability.

Kubernetes Command Injection Inspektor Gadget +1
NVD GitHub VulDB
CVE-2026-1625
EPSS 0% CVSS 6.3
MEDIUM This Month

Command injection in D-Link DWR-M961 firmware version 1.1.47 allows authenticated remote attackers to execute arbitrary commands via manipulation of the action_value parameter in the SMS message handling function. The vulnerability requires valid credentials but no user interaction, and public exploit code is available. Affected systems can suffer unauthorized command execution, data theft, and potential device compromise.

D-Link Command Injection Dwr M961 Firmware
NVD GitHub VulDB
CVE-2026-1624
EPSS 0% CVSS 6.3
MEDIUM This Month

Command injection in D-Link DWR-M961 firmware through the /boafrm/formLtefotaUpgradeFibocom endpoint allows authenticated remote attackers to execute arbitrary commands by manipulating the fota_url parameter. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Command Injection Dwr M961 Firmware
NVD GitHub VulDB
CVE-2026-1623
EPSS 2% CVSS 6.3
MEDIUM POC This Month

Command injection in Totolik A7000R firmware through the setUpgradeFW function allows unauthenticated remote attackers to execute arbitrary commands via a malicious FileName parameter. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The device remains vulnerable as no patch is currently available.

Command Injection A7000r Firmware
NVD GitHub VulDB
CVE-2026-1601
EPSS 8% CVSS 6.3
MEDIUM POC This Month

A7000R Firmware versions up to 4.1cu.4154 contains a vulnerability that allows attackers to command injection (CVSS 6.3).

Command Injection A7000r Firmware
NVD GitHub VulDB
CVE-2026-1596
EPSS 0% CVSS 6.3
MEDIUM This Month

Command injection in D-Link DWR-M961 firmware (version 1.1.47) allows unauthenticated remote attackers to execute arbitrary commands through the fota_url parameter in the LTE firmware upgrade function. Public exploit code exists for this vulnerability, which requires low privileges but no user interaction to exploit. No patch is currently available for affected devices.

D-Link Command Injection Dwr M961 Firmware
NVD GitHub VulDB
CVE-2026-23571
EPSS 0% CVSS 6.8
MEDIUM This Month

TeamViewer DEX versions below 24.5 allow authenticated users with actioner privileges to execute arbitrary elevated commands on connected hosts through inadequate input validation in the 1E-Nomad-RunPkgStatusRequest instruction. An attacker with these credentials could inject malicious commands to gain unauthorized system access and control. The vulnerability requires user interaction and high-level privileges but carries a significant risk due to the potential for complete system compromise.

Command Injection Digital Employee Experience
NVD
CVE-2026-1548
EPSS 1% CVSS 6.3
MEDIUM POC This Month

Command injection in Totolik A7000R firmware (version 4.1cu.4154) via the CloudACManualUpdateUserdata function allows authenticated remote attackers to execute arbitrary commands through a crafted url parameter. Public exploit code exists for this vulnerability and no patch is currently available.

Command Injection A7000r Firmware
NVD GitHub VulDB
CVE-2026-1547
EPSS 1% CVSS 6.3
MEDIUM POC This Month

Command injection in Totolik A7000R firmware allows authenticated remote attackers to execute arbitrary commands through the plugin_name parameter in the setUnloadUserData function. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires network access and valid credentials but no user interaction.

Command Injection A7000r Firmware
NVD GitHub VulDB
CVE-2026-1544
EPSS 0% CVSS 6.3
MEDIUM POC This Month

D-Link DIR-823X routers are vulnerable to remote command injection through the lan_gateway parameter in the /goform/set_mode function, allowing authenticated attackers to execute arbitrary OS commands. Public exploit code is available for this vulnerability, and affected devices are no longer receiving security updates from the vendor. The attack requires network access and valid credentials but has a low CVSS score of 6.3 due to limited impact scope.

D-Link Command Injection Dir 823x Firmware
NVD GitHub VulDB
CVE-2022-40619
EPSS 1% CVSS 7.7
HIGH POC This Week

FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. [CVSS 7.7 HIGH]

Netgear Command Injection R7000 Firmware +9
NVD
CVE-2025-57283
EPSS 0% CVSS 7.8
HIGH PATCH This Week

The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js. [CVSS 7.8 HIGH]

Node.js Command Injection Browserstack Local +1
NVD GitHub
CVE-2026-1506
EPSS 0% CVSS 7.2
HIGH POC This Week

Unauthenticated remote attackers can inject arbitrary OS commands through the MAC filter configuration parameter in D-Link DIR-615 firmware version 4.10 and potentially earlier versions. Public exploit code exists for this vulnerability, and affected devices are no longer receiving security updates from D-Link. Successful exploitation grants complete system compromise with high impact to confidentiality, integrity, and availability.

D-Link PHP Command Injection +1
NVD VulDB
CVE-2026-1505
EPSS 1% CVSS 7.2
HIGH POC This Week

Command injection in D-Link DIR-615 firmware via the /set_temp_nodes.php URL Filter component allows unauthenticated remote attackers to execute arbitrary OS commands. Public exploit code exists for this vulnerability, which affects legacy unsupported devices with a 7.2 CVSS score and no available patch.

D-Link PHP Command Injection +1
NVD VulDB
CVE-2026-24841
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

Dokploy self-hosted PaaS prior to 0.26.6 has a critical command injection vulnerability (CVSS 9.9) allowing authenticated users to execute arbitrary OS commands on the host.

Docker Command Injection Dokploy
NVD GitHub
CVE-2026-1448
EPSS 0% CVSS 7.2
HIGH POC This Week

Remote code execution in D-Link DIR-615 firmware through os command injection via the ipaddr parameter in the Web Management Interface allows unauthenticated remote attackers to execute arbitrary commands. The vulnerability affects unsupported firmware versions up to 4.10, and public exploit code is available. No patch has been released by the vendor.

D-Link PHP Command Injection +1
NVD VulDB
CVE-2025-14756
EPSS 0% CVSS 8.8
HIGH This Week

Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise. [CVSS 8.8 HIGH]

TP-Link Command Injection Archer Mr600 Firmware
NVD
CVE-2016-15057
EPSS 38% CVSS 9.9
CRITICAL Emergency

Command injection in Apache Continuum (unsupported). EPSS 37.9% indicates active exploitation of this legacy CI/CD system. No patch available — product is end-of-life.

Apache Command Injection Continuum
NVD
CVE-2026-1428
EPSS 0% CVSS 8.8
HIGH This Week

WellChoose's Single Sign-On Portal System contains an OS command injection vulnerability that allows authenticated users to execute arbitrary commands on the affected server. Attackers with valid credentials can exploit this flaw to achieve remote code execution with full system privileges. No patch is currently available for this high-severity vulnerability.

Command Injection Single Sign On Portal System
NVD
CVE-2026-1427
EPSS 0% CVSS 8.8
HIGH POC This Week

The WellChoose Single Sign-On Portal System contains an OS command injection vulnerability that allows authenticated users to execute arbitrary commands on the affected server. An attacker with valid credentials can bypass input validation to inject malicious OS commands, achieving full system compromise with high impact to confidentiality, integrity, and availability. No patch is currently available for this vulnerability.

Command Injection Single Sign On Portal System
NVD GitHub
CVE-2026-1419
EPSS 0% CVSS 4.7
MEDIUM POC This Month

Dcs-700L Firmware versions up to 1.03.09 contains a vulnerability that allows attackers to command injection (CVSS 4.7).

D-Link Command Injection Dcs 700l Firmware
NVD VulDB
CVE-2026-1414
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Operation And Maintenance Security Management System versions up to 3.0.12. contains a vulnerability that allows attackers to command injection (CVSS 6.3).

Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVE-2026-1413
EPSS 0% CVSS 6.3
MEDIUM This Month

Operation And Maintenance Security Management System versions up to 3.0.12. contains a security vulnerability (CVSS 6.3).

Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVE-2026-1412
EPSS 0% CVSS 7.3
HIGH POC This Week

Operation And Maintenance Security Management System versions up to 3.0.12. contains a security vulnerability (CVSS 7.3).

Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVE-2025-67264
EPSS 0% CVSS 7.8
HIGH POC This Week

An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710 [CVSS 7.8 HIGH]

Command Injection Note59 Pro Firmware Note59 Firmware
NVD GitHub
CVE-2026-24423
EPSS 29% 4.3 CVSS 9.8
CRITICAL KEV THREAT Emergency

SmarterTools SmarterMail prior to build 9511 contains a second critical vulnerability (CVE-2026-24423) — an unauthenticated remote code execution flaw in the ConnectToHub API method. An attacker can redirect the SmarterMail server to connect to a malicious HTTP endpoint that serves OS commands for execution. KEV-listed with EPSS 29%, this is chainable with CVE-2026-23760 for complete server compromise.

RCE Command Injection Smartermail
NVD
CVE-2021-47903
EPSS 0% CVSS 8.8
HIGH POC This Week

LiteSpeed Web Server Enterprise 5.4.11 contains an authenticated command injection vulnerability in the external app configuration interface. [CVSS 8.8 HIGH]

RCE Path Traversal Command Injection
NVD Exploit-DB
CVE-2026-0796
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices due to insufficient input validation. The vulnerability requires valid credentials to exploit but provides complete system compromise with high confidentiality, integrity, and availability impact. No patch is currently available for this issue.

Golang RCE Command Injection +1
NVD
CVE-2026-0795
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter devices via command injection in the web UI allows authenticated attackers to execute arbitrary system commands due to insufficient input validation. An attacker with valid credentials can inject malicious commands through user-supplied parameters to gain code execution on the affected device. No patch is currently available for this vulnerability.

Golang RCE Command Injection +1
NVD
CVE-2026-0787
EPSS 1% CVSS 9.8
CRITICAL Act Now

ALGO 8180 IP Audio Alerter has a command injection in the SAC interface (EPSS 0.68%) allowing remote code execution on the emergency notification device.

Golang RCE Command Injection +1
NVD
CVE-2026-0786
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware results from insufficient input validation in the SCI module, allowing authenticated attackers to inject arbitrary commands and execute code with device privileges. The vulnerability affects Golang-based implementations and carries a high CVSS score of 8.8, with no patch currently available. Exploitation requires valid credentials but poses significant risk to networked audio alerting infrastructure.

Golang RCE Command Injection +1
NVD
CVE-2026-0785
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the API interface allows authenticated attackers to execute arbitrary system commands on affected devices due to insufficient input validation. The vulnerability has a high CVSS score of 8.8 and currently lacks a patch. With an EPSS score of 0.8%, exploitation is possible but not yet widely observed in the wild.

Golang RCE Command Injection +1
NVD
CVE-2026-0784
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on vulnerable devices due to insufficient input validation. An attacker with valid credentials can inject malicious commands through unsanitized user input to compromise the device and execute code with device privileges. No patch is currently available for this vulnerability.

Golang RCE Command Injection +1
NVD
CVE-2026-0783
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices through insufficient input validation. An attacker with valid credentials can inject malicious commands through unsanitized user input parameters to achieve code execution in the device context. No patch is currently available for this high-severity vulnerability.

Golang RCE Command Injection +1
NVD
CVE-2026-0782
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter devices through command injection in the web management interface allows authenticated attackers to execute arbitrary commands with device privileges. The vulnerability stems from insufficient input validation of user-supplied parameters passed to system calls. A patch is not currently available for this high-severity flaw affecting Golang-based firmware.

Golang RCE Command Injection +1
NVD
CVE-2026-0781
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices due to insufficient input validation. An attacker with valid credentials can exploit this vulnerability to achieve code execution in the device context. No patch is currently available for this high-severity vulnerability (CVSS 8.8).

Golang RCE Command Injection +1
NVD
CVE-2026-0780
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware through command injection in the web UI allows authenticated attackers to execute arbitrary commands on affected devices due to insufficient input validation. The vulnerability requires valid credentials to exploit but enables complete device compromise once authenticated. No patch is currently available for this high-severity flaw affecting the Golang-based firmware.

Golang RCE Command Injection +1
NVD
CVE-2026-0779
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in ALGO 8180 IP Audio Alerter firmware via command injection in the web interface allows authenticated attackers to execute arbitrary code on affected devices through insufficient input validation. The vulnerability requires valid credentials but no user interaction to exploit, presenting significant risk to networked audio alerting systems. No patch is currently available.

Golang RCE Command Injection +1
NVD
CVE-2026-0766
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in Open WebUI through the load_tool_module_by_id function allows authenticated attackers to execute arbitrary Python code due to insufficient input validation on user-supplied strings. An attacker with valid credentials can leverage this vulnerability to achieve code execution with service account privileges. No patch is currently available, making this a critical risk for deployed Open WebUI instances.

Python RCE Command Injection +2
NVD
CVE-2026-0765
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution in Open WebUI's install_frontmatter_requirements function allows authenticated attackers to execute arbitrary commands on the host system by bypassing input validation in system call parameters. The vulnerability affects AI/ML deployments using Open WebUI and requires valid authentication credentials to exploit. No patch is currently available.

RCE Command Injection AI / ML +1
NVD
CVE-2026-0759
EPSS 1% CVSS 9.8
CRITICAL Act Now

Katana Network Development Starter Kit has a command injection in executeCommand enabling remote code execution through the development framework.

RCE Command Injection AI / ML
NVD
CVE-2026-0758
EPSS 0% CVSS 7.8
HIGH This Week

mcp-server-siri-shortcuts fails to validate the shortcutName parameter before using it in system calls, enabling local attackers with low-privileged code execution to inject arbitrary commands and escalate to service account privileges. This command injection vulnerability (CVE-2026-0758, CVSS 7.8) affects the AI/ML tool and currently lacks a patch. An attacker exploiting this flaw can execute arbitrary code with elevated privileges on the affected system.

Privilege Escalation Command Injection AI / ML
NVD
CVE-2026-0757
EPSS 0% CVSS 8.8
HIGH This Week

MCP Manager for Claude Desktop is vulnerable to command injection through improperly validated MCP config objects, enabling remote attackers to escape the sandbox and execute arbitrary code on affected systems. The vulnerability requires user interaction such as visiting a malicious page or opening a malicious file, and currently lacks an available patch. An attacker can leverage this flaw to achieve code execution with medium integrity privileges in the context of the running process.

Command Injection AI / ML
NVD
CVE-2026-0756
EPSS 1% CVSS 9.8
CRITICAL Act Now

github-kanban-mcp-server has a command injection in execAsync (EPSS 1.0%) enabling remote code execution on developer machines using the GitHub Kanban MCP integration.

Github RCE Command Injection +1
NVD
CVE-2026-0755
EPSS 1% CVSS 9.8
CRITICAL Act Now

gemini-mcp-tool has a command injection in execAsync allowing remote code execution on systems using the Gemini AI MCP integration.

RCE Command Injection AI / ML
NVD
CVE-2025-15063
EPSS 1% CVSS 9.8
CRITICAL Act Now

Ollama MCP Server has a command injection vulnerability in execAsync (EPSS 1.0%) allowing remote attackers to execute arbitrary commands on systems running the Ollama AI integration.

RCE Command Injection AI / ML +1
NVD
CVE-2025-15061
EPSS 1% CVSS 9.8
CRITICAL PATCH Act Now

Framelink Figma MCP Server has a command injection vulnerability in fetchWithRetry (EPSS 1.4%) enabling remote code execution on developer machines using the MCP integration.

RCE Command Injection AI / ML
NVD GitHub
CVE-2026-24132
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Orval TypeScript code generator versions 7.19+ have a command injection vulnerability allowing RCE through malicious OpenAPI specifications during code generation.

Command Injection Orval
NVD GitHub
CVE-2026-21520
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can remotely access sensitive information in Microsoft Copilot Studio due to improper access controls, requiring no authentication or user interaction. This network-based vulnerability exposes confidential data to unauthorized disclosure with no patch currently available.

Command Injection AI / ML Copilot Studio
NVD
CVE-2025-56590
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Apryse HTML2PDF SDK through version 11.10 has a command injection vulnerability in the InsertFromURL function allowing remote code execution when converting HTML to PDF.

Command Injection RCE Html2pdf
NVD
CVE-2026-1327
EPSS 1% CVSS 6.3
MEDIUM POC This Month

Totolik NR1800X firmware versions up to 9.1.0u.6279_B20210910 contain a command injection vulnerability in the setTracerouteCfg function that allows authenticated remote attackers to execute arbitrary commands via malicious POST requests. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker with valid credentials can leverage this to achieve remote code execution on affected network devices.

Command Injection Nr1800x Firmware
NVD VulDB
CVE-2026-1326
EPSS 3% CVSS 6.3
MEDIUM POC This Month

Command injection in Totolik NR1800X firmware allows authenticated remote attackers to execute arbitrary commands through the Hostname parameter in the setWanCfg POST handler. Public exploit code exists for this vulnerability, creating elevated risk despite no patch availability. Affected devices can be compromised to gain full system control with network access and valid credentials.

Command Injection Nr1800x Firmware
NVD VulDB
CVE-2026-1324
EPSS 0% CVSS 8.8
HIGH POC This Week

Operation And Maintenance Security Management System versions up to 3.0.12. is affected by command injection (CVSS 8.8).

Ssh Command Injection Operation And Maintenance Security Management System
NVD GitHub VulDB
CVE-2026-23699
EPSS 0% CVSS 7.2
HIGH This Week

Unauthenticated attackers can execute arbitrary OS commands on AP180 series devices running firmware versions before AP_RGOS 11.9(4)B1P8 through a command injection vulnerability. This allows complete system compromise including data theft, modification, and availability disruption. No patch is currently available.

Command Injection
NVD
CVE-2026-0933
EPSS 0% CVSS 9.9
CRITICAL PATCH Act Now

Cloudflare Wrangler CLI has a CVSS 9.9 command injection vulnerability in the 'wrangler pages deploy' command that allows arbitrary code execution during deployment.

Command Injection Wrangler
NVD GitHub
Prev Page 7 of 22 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy