Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in TinyZero HDFS Utilities Enables Remote Code Execution |
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jiayi-pan
Jiayi-pan tinyzero |
|
| Vendors & Products |
Jiayi-pan
Jiayi-pan tinyzero |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The TinyZero project thru commit 6652a63c57fa7e5ccde3fc9c598c7176ff15b839 (2025-58-24) contains a critical command injection vulnerability (CWE-78) in its HDFS file operation utilities. The vulnerability arises from the unsafe construction and execution of shell commands via os.system() without proper input sanitization or escaping. User-controlled input (such as file paths) is directly interpolated into shell command strings using f-strings within the _copy() function. An attacker can inject arbitrary OS commands by supplying a specially crafted path parameter through the Hydra configuration framework. This leads to remote code execution with the privileges of the user running the TinyZero training process. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T14:08:46.542Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31226
Updated: 2026-05-13T14:08:25.602Z
Status : Awaiting Analysis
Published: 2026-05-12T16:16:14.530
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-31226
No data.
OpenCVE Enrichment
Updated: 2026-05-13T16:30:36Z