Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9c88-49p5-5ggf | Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path |
Sat, 21 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Systeminformation
Systeminformation systeminformation |
|
| CPEs | cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Systeminformation
Systeminformation systeminformation |
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sebhildebrandt
Sebhildebrandt systeminformation |
|
| Vendors & Products |
Sebhildebrandt
Sebhildebrandt systeminformation |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retry (lines 440-441) calls `getWifiNetworkListIw(iface)` with the **original unsanitized** `iface` value, which is passed directly to `execSync('iwlist ${iface} scan')`. Any application passing user-controlled input to `si.wifiNetworks()` is vulnerable to arbitrary command execution with the privileges of the Node.js process. Version 5.30.8 fixes the issue. | |
| Title | Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T21:21:38.406Z
Reserved: 2026-02-12T17:10:53.414Z
Link: CVE-2026-26280
Updated: 2026-02-19T20:57:38.295Z
Status : Analyzed
Published: 2026-02-19T20:25:43.880
Modified: 2026-02-20T20:10:59.037
Link: CVE-2026-26280
OpenCVE Enrichment
Updated: 2026-04-17T18:00:12Z
Github GHSA