Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Themactep
Themactep thingino-firmware |
|
| Vendors & Products |
Themactep
Themactep thingino-firmware |
Thu, 26 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | thingino-firmware versions up to the firmware-2026-03-16 release contains an unauthenticated os command injection vulnerability in the WiFi captive portal CGI script that allows remote attackers to execute arbitrary commands as root by injecting malicious code through unsanitized HTTP parameter names. Attackers can exploit the eval function in parse_query() and parse_post() functions to achieve remote code execution and perform privileged configuration changes including root password reset and SSH authorized_keys modification, resulting in full persistent device compromise. | |
| Title | thingino-firmware api.cgi Unauthenticated Command Injection in Captive Portal | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-26T19:21:33.135Z
Reserved: 2026-02-11T20:08:07.943Z
Link: CVE-2026-26213
Updated: 2026-03-26T19:21:28.345Z
Status : Awaiting Analysis
Published: 2026-03-26T19:16:38.787
Modified: 2026-03-30T13:26:50.827
Link: CVE-2026-26213
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:25:38Z