CVE-2026-27626 - Vulnerability Analysis
CriticalCVSS: 9.9Last Updated: February 25, 2026
OliveTin - Command Injection
Overview
OliveTin <= 3000.10.0 contains a command injection caused by insufficient shell argument safety checks on 'password' type and webhook JSON values, letting authenticated or unauthenticated attackers execute arbitrary OS commands remotely, exploit requires webhook usage or user authentication.
Severity & Score
Impact
Attackers can execute arbitrary OS commands remotely, leading to full system compromise with OliveTin process permissions.
Mitigation
Update to the latest version once a patch is available.
Social Media Activity(1 post)
š“ CVE-2026-27626 - Critical (9.9) OliveTin gives access to predefined shell commands from a web interface. In versions up to and including 3000.10.0, OliveTin's shell mode safety check (`checkShellArgumentSafety`) blocks several dangerous argument types but not `password`. A user ... š https://www.thehackerwire.com/vulnerability/CVE-2026-27626/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-27626
- Severity
- Critical
- CVSS Score
- 9.9
- Type
- command_injection
- Status
- unconfirmed
- EPSS
- 8.5%
- Social Posts
- 1
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H