Home

Description

A vulnerability was found in 0xKoda WireMCP up to 7f45f8b2b4adeb76be8c6227eefb38533fdd6b1e. Impacted is the function server.tool of the file index.js of the component Tshark CLI Command Handler. The manipulation results in os command injection. The attack needs to be approached locally. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-11 | Updated 2026-03-12 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

OS Command Injection

Command Injection

Product status

7f45f8b2b4adeb76be8c6227eefb38533fdd6b1e
affected

Timeline

2026-03-11:Advisory disclosed
2026-03-11:VulDB entry created
2026-03-11:VulDB entry last update

Credits

Yinci Chen (VulDB User) reporter

References

vuldb.com/?id.350389 (VDB-350389 | 0xKoda WireMCP Tshark CLI index.js server.tool os command injection) vdb-entry technical-description

vuldb.com/?ctiid.350389 (VDB-350389 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.768129 (Submit #768129 | 0xKoda WireMCP <=1.0.0 Command Injection) third-party-advisory

github.com/0xKoda/WireMCP/issues/12 issue-tracking

github.com/...s/files/25571315/WireMCP_security_advisory.pdf exploit

github.com/0xKoda/WireMCP/ product

cve.org (CVE-2026-3959)

nvd.nist.gov (CVE-2026-3959)

Download JSON