CVE-2026-40061 - Vulnerability Analysis
HighCVSS: 8.7Last Updated: May 13, 2026
BIG-IP DNS - Command Injection
Overview
BIG-IP DNS contains a command injection caused by an undisclosed iControl REST and tmsh command, letting authenticated Resource Administrator or Administrator execute arbitrary system commands with higher privileges, exploit requires authenticated admin roles.
Severity & Score
Impact
Authenticated administrators can execute arbitrary system commands with elevated privileges, potentially compromising the entire system.
Mitigation
Update to the latest supported version.
Social Media Activity(2 posts)
š CVE-2026-40061 - High (8.7) When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system ... š https://www.thehackerwire.com/vulnerability/CVE-2026-40061/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-40061 - High (8.7) When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system ... š https://www.thehackerwire.com/vulnerability/CVE-2026-40061/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-40061
- Severity
- High
- CVSS Score
- 8.7
- Type
- command_injection
- Status
- unconfirmed
- EPSS
- 5.3%
- Social Posts
- 2
CWE
- CWE-77
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N