CVE-2026-28442 - Vulnerability Analysis
HighCVSS: 8.5Last Updated: March 6, 2026
ZimaOS - Broken Access Control
Overview
ZimaOS 1.5.2-beta3 contains a broken access control vulnerability caused by improper validation of the path parameter in delete requests, letting attackers delete internal system files via the API, exploit requires API access.
Severity & Score
Impact
Attackers can delete critical system files, potentially causing system instability or denial of service.
Mitigation
Update to the latest version once a patch is available or implement proper path validation and access controls.
Social Media Activity(1 post)
š CVE-2026-28442 - High (8.5) ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, users are restricted from deleting internal system files or folders through the application interface. However, when interacting... š https://www.thehackerwire.com/vulnerability/CVE-2026-28442/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28442
- Severity
- High
- CVSS Score
- 8.5
- Type
- broken_access_control
- Status
- new
- EPSS
- 4.2%
- Social Posts
- 1
CWE
- CWE-73
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H