Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for an attacker to execute arbitrary commands on the operating system that this package is being run on.
{
"nvd_published_at": "2024-01-30T05:15:09Z",
"cwe_ids": [
"CWE-77"
],
"github_reviewed_at": "2024-01-30T18:43:05Z",
"severity": "HIGH",
"github_reviewed": true
}