CVE-2026-6987
🟡 Monitoruj
Wstrzyknięcie poleceń w PicoClaw umożliwia zdalne wykonanie kodu.
CVSS
7.3
EPSS
2.1%
Exploit
poc
Vendor
sipeed
Opis źródłowy (NVD)
A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 2.1% |
| Opublikowano (NVD) | 2026-04-25 17:16:33 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 20:24:30 UTC |
Referencje
- https://github.com/sipeed/picoclaw/issues/2307 (cna@vuldb.com) [Exploit, Mitigation, Vendor Advisory, Issue Tracking]
- https://vuldb.com/submit/796336 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359530 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359530/cti (cna@vuldb.com) [Permissions Required, VDB Entry]