Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opnsense opnsense
|
|
| CPEs | cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opnsense opnsense
|
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opnsense
Opnsense core |
|
| Vendors & Products |
Opnsense
Opnsense core |
Wed, 13 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.8, unsanitized user input is passed to the DHCP configuration of the configured interface, which is processed by a shell script, allowing remote code execution as root on the underlying operating system. This vulnerability is fixed in 26.1.8. | |
| Title | OPNsense: Command Injection via Attacker-Controlled DHCP Config | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:22:09.189Z
Reserved: 2026-05-08T20:44:38.964Z
Link: CVE-2026-45158
Updated: 2026-05-14T12:22:05.971Z
Status : Analyzed
Published: 2026-05-13T22:16:46.363
Modified: 2026-05-15T16:19:38.600
Link: CVE-2026-45158
No data.
OpenCVE Enrichment
Updated: 2026-05-14T00:00:07Z