CVE-2026-2035

Source
https://cve.org/CVERecord?id=CVE-2026-2035
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2035.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2035
Published
2026-02-20T23:16:03.370Z
Modified
2026-02-25T07:41:53.904115Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Deciso OPNsense diag_backup.php filename Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Deciso OPNsense. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of backup configuration files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-28131.

References

Affected packages

Git / github.com/opnsense/core

Affected ranges

Type
GIT
Repo
https://github.com/opnsense/core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

15.*
15.1
15.1.1
15.1.10
15.1.10.1
15.1.10.2
15.1.11
15.1.11.1
15.1.11.2
15.1.11.3
15.1.11.4
15.1.12
15.1.2
15.1.3
15.1.4
15.1.5
15.1.6
15.1.6.1
15.1.7
15.1.7.1
15.1.7.2
15.1.8
15.1.8.1
15.1.8.2
15.1.8.3
15.1.8.4
15.1.9
15.1.9.1
15.1.9.2
15.7
16.*
16.7.a
16.7.b
16.7.r
17.*
17.1.a
17.1.b
17.1.r
17.7.a
17.7.b
17.7.r
18.*
18.1.a
18.1.b
18.1.r
18.7.a
18.7.b
18.7.r
19.*
19.1.a
19.1.b
19.1.r
19.7.a
19.7.b
19.7.r
20.*
20.1.a
20.1.b
20.1.r
20.7.a
20.7.b
20.7.r
21.*
21.1.a
21.1.b
21.1.r
21.7.a
21.7.b
21.7.r
22.*
22.1.a
22.1.b
22.1.r
22.7.a
22.7.b
22.7.r
23.*
23.1.a
23.1.b
23.1.r
23.7.a
23.7.b
23.7.r
24.*
24.1.a
24.1.b
24.1.r
24.7.a
24.7.b
24.7.r
25.*
25.1.a
25.1.b
25.1.r
25.7.a
25.7.b
25.7.r
26.*
26.1.a

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2035.json"