Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-88:Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Weakness ID:88
Version:v4.17
Weakness Name:Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
293Vulnerabilities found

CVE-2025-15315
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.25%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 21:48
Updated-10 Feb, 2026 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed a local privilege escalation vulnerability in Tanium Module Server.

Tanium addressed a local privilege escalation vulnerability in Tanium Module Server.

Action-Not Available
Vendor-Tanium
Product-Tanium Module Server
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-15316
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
ShareView Details
Assigner-3938794e-25f5-4123-a1ba-5cbd7f104512
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.25%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 21:48
Updated-10 Feb, 2026 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tanium addressed a local privilege escalation vulnerability in Tanium Server.

Tanium addressed a local privilege escalation vulnerability in Tanium Server.

Action-Not Available
Vendor-Tanium
Product-Tanium Server
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2026-25134
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.12% / 31.29%
||
7 Day CHG+0.01%
Published-02 Feb, 2026 | 22:40
Updated-04 Feb, 2026 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Group-Office Argument Injection in MaintenanceController::actionZipLanguage

Group-Office is an enterprise customer relationship management and groupware tool. Prior to 6.8.150, 25.0.82, and 26.0.5, the MaintenanceController exposes an action zipLanguage which takes a lang parameter and passes it directly to a system zip command via exec(). This can be combined with uploading a crafted zip file to achieve remote code execution. This vulnerability is fixed in 6.8.150, 25.0.82, and 26.0.5.

Action-Not Available
Vendor-Intermesh
Product-groupoffice
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2026-24739
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 0.26%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 20:25
Updated-02 Feb, 2026 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Symfony has incorrect argument escaping under MSYS2/Git Bash on Windows that can lead to destructive file operations

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents of a broader directory or drive. The issue is particularly relevant when untrusted input can influence process arguments (directly or indirectly, e.g. via repository paths, extracted archive paths, temporary directories, or user-controlled configuration). Versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5 contains a patch for the issue. Some workarounds are available. Avoid running PHP/one's own tooling from MSYS2-based shells on Windows; prefer cmd.exe or PowerShell for workflows that spawn native executables. Avoid passing paths containing `=` (and similar MSYS2-sensitive characters) to Symfony Process when operating under Git Bash/MSYS2. Where applicable, configure MSYS2 to disable or restrict argument conversion (e.g. via `MSYS2_ARG_CONV_EXCL`), understanding this may affect other tooling behavior.

Action-Not Available
Vendor-sensiolabssymfony
Product-symfonysymfony
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2026-22583
Assigner-Salesforce, Inc.
ShareView Details
Assigner-Salesforce, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 4.99%
||
7 Day CHG~0.00%
Published-24 Jan, 2026 | 00:20
Updated-12 Feb, 2026 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.

Action-Not Available
Vendor-salesforceSalesforce
Product-marketing_cloud_engagementMarketing Cloud Engagement
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2026-22582
Assigner-Salesforce, Inc.
ShareView Details
Assigner-Salesforce, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 4.99%
||
7 Day CHG~0.00%
Published-24 Jan, 2026 | 00:19
Updated-12 Feb, 2026 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (MicrositeUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.

Action-Not Available
Vendor-salesforceSalesforce
Product-marketing_cloud_engagementMarketing Cloud Engagement
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2026-0774
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-0.19% / 40.45%
||
7 Day CHG~0.00%
Published-23 Jan, 2026 | 03:29
Updated-26 Jan, 2026 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchYourLAN Configuration Page Argument Injection Remote Code Execution Vulnerability

WatchYourLAN Configuration Page Argument Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WatchYourLAN. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the arpstrs parameter. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26708.

Action-Not Available
Vendor-WatchYourLAN
Product-WatchYourLAN
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2026-24061
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-83.89% / 99.27%
||
7 Day CHG+54.34%
Published-21 Jan, 2026 | 06:42
Updated-11 Feb, 2026 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2026-02-16||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Action-Not Available
Vendor-GNUDebian GNU/Linux
Product-inetutilsdebian_linuxInetutilsInetUtils
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-67858
Assigner-SUSE
ShareView Details
Assigner-SUSE
CVSS Score-7||HIGH
EPSS-0.03% / 8.74%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 15:23
Updated-08 Jan, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A crafted "interface" input parameter can lead to integrity loss of the firewall configuration

A Improper Neutralization of Argument Delimiters vulnerability in Foomuuri can lead to integrity loss of the firewall configuration or further unspecified impact by manipulating the JSON configuration passed to `nft`. This issue affects Foomuuri: from ? before 0.31.

Action-Not Available
Vendor-https://github.com/FoobarOy/
Product-Foomuuri
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-66002
Assigner-SUSE
ShareView Details
Assigner-SUSE
CVSS Score-6.9||MEDIUM
EPSS-0.03% / 7.58%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 14:25
Updated-08 Jan, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local users can perform arbitrary unmounts via smb4k mount helper due to lack of input validation

An Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability allows local users ton perform arbitrary unmounts via smb4k mount helper

Action-Not Available
Vendor-https://github.com/KDE/
Product-smb4k
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-14946
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 5.23%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 13:02
Updated-22 Dec, 2025 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri

A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 8libnbdRed Hat OpenShift Virtualization 4Red Hat Enterprise Linux 10Red Hat Enterprise Linux 9
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-68144
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.11% / 29.81%
||
7 Day CHG~0.00%
Published-17 Dec, 2025 | 22:10
Updated-18 Dec, 2025 | 15:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mcp-server-git argument injection in git_diff and git_checkout functions allows overwriting local files

In mcp-server-git versions prior to 2025.12.17, the git_diff and git_checkout functions passed user-controlled arguments directly to git CLI commands without sanitization. Flag-like values (e.g., `--output=/path/to/file` for `git_diff`) would be interpreted as command-line options rather than git refs, enabling arbitrary file overwrites. The fix adds validation that rejects arguments starting with - and verifies the argument resolves to a valid git ref via rev_parse before execution. Users are advised to update to 2025.12.17 resolve this issue when it is released.

Action-Not Available
Vendor-modelcontextprotocol
Product-servers
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-62847
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.12% / 30.99%
||
7 Day CHG~0.00%
Published-16 Dec, 2025 | 02:25
Updated-17 Dec, 2025 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QTS, QuTS hero

An improper neutralization of argument delimiters in a command vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to alter execution logic. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3297 build 20251024 and later QuTS hero h5.2.7.3297 build 20251024 and later QuTS hero h5.3.1.3292 build 20251024 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qtsquts_heroQTSQuTS hero
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2024-58275
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-1.18% / 78.42%
||
7 Day CHG+0.16%
Published-04 Dec, 2025 | 20:41
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Easywall 0.3.1 - Authentication Bypass via Command Injection in /ports-save Endpoint

Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server.

Action-Not Available
Vendor-jpylypiw
Product-Easywall
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-12613
Assigner-Snyk
ShareView Details
Assigner-Snyk
CVSS Score-8.8||HIGH
EPSS-0.07% / 21.49%
||
7 Day CHG~0.00%
Published-10 Nov, 2025 | 05:00
Updated-12 Nov, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of the package cloudinary before 2.7.0 are vulnerable to Arbitrary Argument Injection due to improper parsing of parameter values containing an ampersand. An attacker can inject additional, unintended parameters. This could lead to a variety of malicious outcomes, such as bypassing security checks, altering data, or manipulating the application's behavior. **Note:** Following our established security policy, we attempted to contact the maintainer regarding this vulnerability, but haven't received a response.

Action-Not Available
Vendor-n/a
Product-cloudinary
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-12556
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.7||HIGH
EPSS-0.11% / 29.04%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 15:35
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IDIS ICM Viewer Argument Injection

An argument injection vulnerability exists in the affected product that could allow an attacker to execute arbitrary code within the context of the host machine.

Action-Not Available
Vendor-IDIS
Product-ICM Viewer
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-36565
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.82%
||
7 Day CHG~0.00%
Published-07 Oct, 2025 | 19:49
Updated-14 Oct, 2025 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.1.0.10, LTS2024 release Versions 7.13.1.0 through 7.13.1.25, LTS 2023 release versions 7.10.1.0 through 7.10.1.50, contain an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution. Exploitation may allow privilege escalation to root.

Action-Not Available
Vendor-Dell Inc.
Product-data_domain_operating_systemPowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature ReleasePowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-43905
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-4.3||MEDIUM
EPSS-0.15% / 36.34%
||
7 Day CHG~0.00%
Published-07 Oct, 2025 | 19:06
Updated-14 Oct, 2025 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.3.0.15, LTS2025 release version 8.3.1.0, LTS2024 release versions 7.13.1.0 through 7.13.1.30, LTS 2023 release versions 7.10.1.0 through 7.10.1.60, contain an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-data_domain_operating_systemPowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2023PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature ReleasePowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2024PowerProtect Data Domain with Data Domain Operating System (DD OS) LTS2025
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-59489
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.02% / 4.02%
||
7 Day CHG~0.00%
Published-03 Oct, 2025 | 00:00
Updated-22 Oct, 2025 | 18:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

Action-Not Available
Vendor-unityUnity3DGoogle LLCApple Inc.Linux Kernel Organization, IncMicrosoft Corporation
Product-windowslinux_kerneleditormacosandroidUnity Editor
CWE ID-CWE-426
Untrusted Search Path
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-59937
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.2||HIGH
EPSS-0.07% / 21.99%
||
7 Day CHG~0.00%
Published-29 Sep, 2025 | 22:21
Updated-16 Oct, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
go-mail has insufficient address encoding when passing mail addresses to the SMTP client

go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user's code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1

Action-Not Available
Vendor-pebcakwneessen
Product-go-mailgo-mail
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-59433
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.83%
||
7 Day CHG~0.00%
Published-22 Sep, 2025 | 19:14
Updated-22 Sep, 2025 | 21:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
@conventional-changelog/git-client has an Argument Injection vulnerability

Conventional Changelog generates changelogs and release notes from a project's commit messages and metadata. Prior to version 2.0.0, @conventional-changelog/git-client has an argument injection vulnerability. This vulnerability manifests with the library's getTags() API, which allows extra parameters to be passed to the git log command. In another API by this library, getRawCommits(), there are secure practices taken to ensure that the extra parameter path is unable to inject an argument by ending the git log command with the special shell syntax --. However, the library does not follow the same practice for getTags() as it does not attempt to sanitize for user input, validate the given params, or restrict them to an allow list. Nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options. Thus, allowing users to exploit an argument injection vulnerability in Git due to the --output= command-line option that results with overwriting arbitrary files. This issue has been patched in version 2.0.0.

Action-Not Available
Vendor-conventional-changelog
Product-conventional-changelog
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-47421
Assigner-Crestron Electronics, Inc.
ShareView Details
Assigner-Crestron Electronics, Inc.
CVSS Score-8.6||HIGH
EPSS-0.05% / 14.54%
||
7 Day CHG+0.01%
Published-03 Sep, 2025 | 13:49
Updated-04 Sep, 2025 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation via SCP login

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injection.This issue affects TOUCHSCREENS x70: from 3.001.0031.001 through 3.001.0034.001. A specially crafted SCP command sent via SSH login string can lead a valid administrator user to gain Privileged Operating System access on the device. Following Products Models are affected: TSW-x70 TSW-x60 TST-1080 AM-3000/3100/3200 Soundbar VB70 HD-PS622/621/402 HD-TXU-RXU-4kZ-211 HD-MDNXM-4KZ-E *Note: additional firmware updates will be published once made available

Action-Not Available
Vendor-Crestron Electronics, Inc.
Product-TOUCHSCREENS x70
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-43730
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-8.4||HIGH
EPSS-0.06% / 19.56%
||
7 Day CHG~0.00%
Published-27 Aug, 2025 | 13:57
Updated-15 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure.

Action-Not Available
Vendor-Dell Inc.
Product-pro_max_16_pluspro_16_plus_pb16250latitude_5440pro_max_14latitude_3420latitude_5540wyse_5070_thin_clientlatitude_3440precision_3280latitude_3450optiplex_all-in-one_7410pro_14_pc14250optiplex_3000_tcoptiplex_5400_all-in-onewyse_5470_all-in-one_thin_clientoptiplex_all-in-one_7420thinospro_rugged_13_ra13250optiplex_micro_plus_7010pro_24_all-in-onewyse_5070_extended_thin_clientpro_tower_qct1250pro_rugged_14_rb14250pro_slim_low_sffoptiplex_7020pro_16_pc16250latitude_5450latitude_5530latitude_5550wyse_5470_mtclatitude_3330precision_3260_compactlatitude_5520ThinOS 10
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-57791
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.9||MEDIUM
EPSS-40.31% / 97.24%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 03:22
Updated-10 Sep, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Argument Injection Vulnerability in CommServe

A security vulnerability has been identified that allows remote attackers to inject or manipulate command-line arguments passed to internal components due to insufficient input validation. Successful exploitation results in a valid user session for a low privilege role.

Action-Not Available
Vendor-Commvault Systems, Inc.
Product-commvaultCommCell
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-6232
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.02% / 5.54%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 19:19
Updated-22 Jul, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper validation vulnerability was reported in Lenovo Vantage that under certain conditions could allow a local attacker to execute code with elevated permissions by modifying specific registry locations.

Action-Not Available
Vendor-Lenovo Group Limited
Product-commercial_vantagevantageVantageCommercial Vantage
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-6231
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.02% / 5.54%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 19:19
Updated-22 Jul, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper validation vulnerability was reported in Lenovo Vantage that under certain conditions could allow a local attacker to execute code with elevated permissions by modifying an application configuration file.

Action-Not Available
Vendor-Lenovo Group Limited
Product-commercial_vantagevantageVantageCommercial Vantage
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-53509
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.1||HIGH
EPSS-0.05% / 16.28%
||
7 Day CHG-0.00%
Published-10 Jul, 2025 | 23:29
Updated-01 Aug, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advantech iView Argument Injection

A vulnerability exists in Advantech iView that allows for argument injection in the NetworkServlet.restoreDatabase(). This issue requires an authenticated attacker with at least user-level privileges. An input parameter can be used directly in a command without proper sanitization, allowing arbitrary arguments to be injected. This can result in information disclosure, including sensitive database credentials.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-iviewiView
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-52459
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.07%
||
7 Day CHG-0.00%
Published-10 Jul, 2025 | 23:28
Updated-15 Jul, 2025 | 13:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advantech iView Argument Injection

A vulnerability exists in Advantech iView that allows for argument injection in NetworkServlet.backupDatabase(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters can be used directly in a command without proper sanitization, allowing arbitrary arguments to be injected. This can result in information disclosure, including sensitive database credentials.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-iView
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-53542
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.14%
||
7 Day CHG~0.00%
Published-10 Jul, 2025 | 18:20
Updated-15 Jul, 2025 | 13:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kubernetes Headlamp Allows Arbitrary Command Injection in macOS Process headlamp@codeSign

Headlamp is an extensible Kubernetes web UI. A command injection vulnerability was discovered in the codeSign.js script used in the macOS packaging workflow of the Kubernetes Headlamp project. This issue arises due to the improper use of Node.js's execSync() function with unsanitized input derived from environment variables, which can be influenced by an attacker. The variables ${teamID}, ${entitlementsPath}, and ${config.app} are dynamically derived from the environment or application config and passed directly to the shell command without proper escaping or argument separation. This exposes the system to command injection if any of the values contain malicious input. This vulnerability is fixed in 0.31.1.

Action-Not Available
Vendor-kubernetes-sigs
Product-headlamp
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-46835
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.5||HIGH
EPSS-0.02% / 5.80%
||
7 Day CHG~0.00%
Published-10 Jul, 2025 | 15:09
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Git GUI can create and overwrite files for which the user has write permission

Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.

Action-Not Available
Vendor-j6t
Product-git-gui
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-48385
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.04% / 11.62%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 18:23
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Git alllows arbitrary file writes via bundle-uri parameter injection

Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.

Action-Not Available
Vendor-git
Product-git
CWE ID-CWE-73
External Control of File Name or Path
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-49520
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.10% / 28.00%
||
7 Day CHG~0.00%
Published-30 Jun, 2025 | 20:45
Updated-13 Nov, 2025 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Event-driven-ansible: authenticated argument injection in git url in eda project creation

A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Ansible Automation Platform 2.5 for RHEL 9Red Hat Ansible Automation Platform 2.5 for RHEL 8
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-52480
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.58% / 68.28%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 16:37
Updated-19 Sep, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Registrator.jl Argument Injection Vulnerability

Registrator is a GitHub app that automates creation of registration pull requests for julia packages to the General registry. Prior to version 1.9.5, if the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities), an argument injection is possible in the `gettreesha()` function. This can then lead to a potential remote code execution. Users should upgrade immediately to v1.9.5 to receive a patch. All prior versions are vulnerable. No known workarounds are available.

Action-Not Available
Vendor-julialangJuliaRegistries
Product-registratorRegistrator.jl
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35010
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.19% / 41.08%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:06
Updated-12 Jan, 2026 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MNPINGTM Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35009
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:06
Updated-12 Jan, 2026 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MNNETSP Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35008
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:05
Updated-12 Jan, 2026 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MMNAME Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35007
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:05
Updated-12 Jan, 2026 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MFRULE Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35006
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:05
Updated-12 Jan, 2026 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MFPORTFWD Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35005
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:05
Updated-12 Jan, 2026 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MFMAC Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-35004
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.1||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG+0.02%
Published-08 Jun, 2025 | 21:05
Updated-12 Jan, 2026 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microhard Bullet-LTE and IPn4Gii AT+MFIP Argument Injection

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This issue has not been generally fixed at the time of this CVE record's first publishing.

Action-Not Available
Vendor-microhardcorpMicrohard
Product-ipn4gii-na2_firmwarebulletlte-na2bulletlte-na2_firmwareipn4gii-na2IPn4Gii / Bullet-LTE Firmware
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-32459
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:04
Updated-21 Jan, 2026 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna router_command.sh (in the sync_time argument) Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qsr10gaqcs-ax3-s5_firmwareqv952cqcs-ax2-s5_firmwareqv940qcs-ax2-a12qcs-ax3-a12qv942c_firmwareqv840c_firmwareqd840qhs710_firmwareqv840_firmwareqcs-ax3-t8_firmwareqsr10ga_firmwareqv860qsr10gu_firmwareqcs-ax2-s5qcs-ax2-t8qcs-ax3-t12qcs-ax2-t12qcs-ax2-t12_firmwareqv942cqcs-ax3-t8qsr10guqd840_firmwareqv940_firmwareqv840qv840cqcs-ax3-t12_firmwareqcs-ax3-a12_firmwareqcs-ax2-a12_firmwareqv860_firmwareqv952c_firmwareqcs-ax2-t8_firmwareqcs-ax3-s5qhs710Quantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-32458
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:04
Updated-21 Jan, 2026 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna router_command.sh (in the get_syslog_from_qtn argument) Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qsr10gaqcs-ax3-s5_firmwareqv952cqcs-ax2-s5_firmwareqv940qcs-ax2-a12qcs-ax3-a12qv942c_firmwareqv840c_firmwareqd840qhs710_firmwareqv840_firmwareqcs-ax3-t8_firmwareqsr10ga_firmwareqv860qsr10gu_firmwareqcs-ax2-s5qcs-ax2-t8qcs-ax3-t12qcs-ax2-t12qcs-ax2-t12_firmwareqv942cqcs-ax3-t8qsr10guqd840_firmwareqv940_firmwareqv840qv840cqcs-ax3-t12_firmwareqcs-ax3-a12_firmwareqcs-ax2-a12_firmwareqv860_firmwareqv952c_firmwareqcs-ax2-t8_firmwareqcs-ax3-s5qhs710Quantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-32457
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:03
Updated-13 Jan, 2026 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna router_command.sh (in the get_file_from_qtn argument) Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qd840qhs710_firmwareqcs-ax2-t8qv840cqhs710qcs-ax3-t8_firmwareqv840c_firmwareqv940_firmwareqv942cqcs-ax2-s5qcs-ax3-t12_firmwareqv952cqcs-ax2-a12_firmwareqsr10gaqcs-ax2-s5_firmwareqcs-ax3-s5qcs-ax2-t12_firmwareqcs-ax3-s5_firmwareqv940qv840qsr10guqcs-ax3-t12qd840_firmwareqcs-ax3-a12qcs-ax2-t12qv840_firmwareqcs-ax2-a12qcs-ax3-a12_firmwareqsr10ga_firmwareqv952c_firmwareqsr10gu_firmwareqv942c_firmwareqv860_firmwareqv860qcs-ax3-t8qcs-ax2-t8_firmwareQuantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-32456
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:03
Updated-13 Jan, 2026 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna router_command.sh (in the put_file_to_qtn argument) Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qd840qhs710_firmwareqcs-ax2-t8qv840cqhs710qcs-ax3-t8_firmwareqv840c_firmwareqv940_firmwareqv942cqcs-ax2-s5qcs-ax3-t12_firmwareqv952cqcs-ax2-a12_firmwareqsr10gaqcs-ax2-s5_firmwareqcs-ax3-s5qcs-ax2-t12_firmwareqcs-ax3-s5_firmwareqv940qv840qsr10guqcs-ax3-t12qd840_firmwareqcs-ax3-a12qcs-ax2-t12qv840_firmwareqcs-ax2-a12qcs-ax3-a12_firmwareqsr10ga_firmwareqv952c_firmwareqsr10gu_firmwareqv942c_firmwareqv860_firmwareqv860qcs-ax3-t8qcs-ax2-t8_firmwareQuantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-32455
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:02
Updated-13 Jan, 2026 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna router_command.sh (in the run_cmd argument) Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qd840qhs710_firmwareqcs-ax2-t8qv840cqhs710qcs-ax3-t8_firmwareqv840c_firmwareqv940_firmwareqv942cqcs-ax2-s5qcs-ax3-t12_firmwareqv952cqcs-ax2-a12_firmwareqsr10gaqcs-ax2-s5_firmwareqcs-ax3-s5qcs-ax2-t12_firmwareqcs-ax3-s5_firmwareqv940qv840qsr10guqcs-ax3-t12qd840_firmwareqcs-ax3-a12qcs-ax2-t12qv840_firmwareqcs-ax2-a12qcs-ax3-a12_firmwareqsr10ga_firmwareqv952c_firmwareqsr10gu_firmwareqv942c_firmwareqv860_firmwareqv860qcs-ax3-t8qcs-ax2-t8_firmwareQuantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-3460
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.20% / 41.51%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:02
Updated-21 Jan, 2026 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna set_tx_pow Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qsr10gaqcs-ax3-s5_firmwareqv952cqcs-ax2-s5_firmwareqv940qcs-ax2-a12qcs-ax3-a12qv942c_firmwareqv840c_firmwareqd840qhs710_firmwareqv840_firmwareqcs-ax3-t8_firmwareqsr10ga_firmwareqv860qsr10gu_firmwareqcs-ax2-s5qcs-ax2-t8qcs-ax3-t12qcs-ax2-t12qcs-ax2-t12_firmwareqv942cqcs-ax3-t8qsr10guqd840_firmwareqv940_firmwareqv840qv840cqcs-ax3-t12_firmwareqcs-ax3-a12_firmwareqcs-ax2-a12_firmwareqv860_firmwareqv952c_firmwareqcs-ax2-t8_firmwareqcs-ax3-s5qhs710Quantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-3459
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-7.7||HIGH
EPSS-0.13% / 32.58%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:02
Updated-21 Jan, 2026 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna transmit_file Argument Injection

The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qsr10gaqcs-ax3-s5_firmwareqv952cqcs-ax2-s5_firmwareqv940qcs-ax2-a12qcs-ax3-a12qv942c_firmwareqv840c_firmwareqd840qhs710_firmwareqv840_firmwareqcs-ax3-t8_firmwareqsr10ga_firmwareqv860qsr10gu_firmwareqcs-ax2-s5qcs-ax2-t8qcs-ax3-t12qcs-ax2-t12qcs-ax2-t12_firmwareqv942cqcs-ax3-t8qsr10guqd840_firmwareqv940_firmwareqv840qv840cqcs-ax3-t12_firmwareqcs-ax3-a12_firmwareqcs-ax2-a12_firmwareqv860_firmwareqv952c_firmwareqcs-ax2-t8_firmwareqcs-ax3-s5qhs710Quantenna Wi-Fi chipset
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-49008
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.12% / 31.47%
||
7 Day CHG+0.01%
Published-05 Jun, 2025 | 00:13
Updated-05 Jun, 2025 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Atheos Improper Input Validation Vulnerability Enables RCE in Common.php

Atheos is a self-hosted browser-based cloud integrated development environment. Prior to version 6.0.4, improper use of `escapeshellcmd()` in `/components/codegit/traits/execute.php` allows argument injection, leading to arbitrary command execution. Atheos administrators and users of vulnerable versions are at risk of data breaches or server compromise. Version 6.0.4 introduces a `Common::safe_execute` function that sanitizes all arguments using `escapeshellarg()` prior to execution and migrated all components potentially vulnerable to similar exploits to use this new templated execution system.

Action-Not Available
Vendor-Atheos
Product-Atheos
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-3945
Assigner-Honeywell International Inc.
ShareView Details
Assigner-Honeywell International Inc.
CVSS Score-7.2||HIGH
EPSS-0.09% / 24.71%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 12:47
Updated-05 Jun, 2025 | 14:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization of Argument Delimiters in a Command (‘Argument Injection’)

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Tridium Niagara Framework on QNX, Tridium Niagara Enterprise Security on QNX allows Command Delimiters. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.

Action-Not Available
Vendor-tridiumTridiumBlackBerry Limited
Product-qnxniagara_enterprise_securityniagaraNiagara FrameworkNiagara Enterprise Security
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-1712
Assigner-Checkmk GmbH
ShareView Details
Assigner-Checkmk GmbH
CVSS Score-8.7||HIGH
EPSS-0.10% / 28.43%
||
7 Day CHG+0.01%
Published-21 May, 2025 | 09:10
Updated-22 Aug, 2025 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary file write with vcrtrace

Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next