← Voltar para CVEs
CVE-2026-7058
HIGH7.3
Descricao
A vulnerability has been found in 666ghj MiroFish up to 0.1.2. The impacted element is the function SimulationIPCClient.send_command of the file backend/app/services/simulation_ipc.py of the component Inter-Process Communication. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Detalhes CVE
Pontuacao CVSS v3.17.3
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/26/2026
Ultima modificacao4/27/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-74CWE-77
Referencias
https://github.com/666ghj/MiroFish/(cna@vuldb.com)
https://github.com/666ghj/MiroFish/issues/488(cna@vuldb.com)
https://vuldb.com/submit/798603(cna@vuldb.com)
https://vuldb.com/vuln/359631(cna@vuldb.com)
https://vuldb.com/vuln/359631/cti(cna@vuldb.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.