Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:khyrenz:parseusbs:*:*:*:*:*:*:*:* |
Thu, 09 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Khyrenz
Khyrenz parseusbs |
|
| Vendors & Products |
Khyrenz
Khyrenz parseusbs |
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | parseusbs before 1.9 contains an OS command injection vulnerability where the volume listing path argument (-v flag) is passed unsanitized into an os.popen() shell command with ls, allowing arbitrary command injection via crafted volume path arguments containing shell metacharacters. An attacker can provide a crafted volume path via the -v flag that injects arbitrary commands during volume content enumeration. | |
| Title | parseusbs < 1.9 Command Injection via Volume Path Argument | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-08T14:07:34.972Z
Reserved: 2026-04-08T13:36:50.661Z
Link: CVE-2026-40030
Updated: 2026-04-09T18:09:39.436Z
Status : Analyzed
Published: 2026-04-08T22:16:23.483
Modified: 2026-04-13T20:27:37.820
Link: CVE-2026-40030
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:37:00Z