CVE-2026-44193 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: May 14, 2026
OPNsense - Remote Code Execution
Overview
OPNsense < 26.1.7 contains a remote code execution caused by unsanitized user input in the XMLRPC method opnsense.restore_config_section, letting remote attackers execute arbitrary code, exploit requires network access.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially taking full control of the system.
Mitigation
Update to version 26.1.7 or later.
Social Media Activity(4 posts)
š“ CVE-2026-44193 - Critical (9.1) OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, the XMLRPC method opnsense.restore_config_section fails to sanitize user supplied input leading to Remote Code Execution. This vulnerability is fixed in 26.1.7. š https://www.thehackerwire.com/vulnerability/CVE-2026-44193/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postā ļø CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! https://radar.offseq.com/threat/cve-2026-44193-cwe-88-improper-neutralization-of-a-d4d4bbb8 #OffSeq #OPNsense #Vuln #RCE
View original postš“ CVE-2026-44193 - Critical (9.1) OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, the XMLRPC method opnsense.restore_config_section fails to sanitize user supplied input leading to Remote Code Execution. This vulnerability is fixed in 26.1.7. š https://www.thehackerwire.com/vulnerability/CVE-2026-44193/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postā ļø CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! https://radar.offseq.com/threat/cve-2026-44193-cwe-88-improper-neutralization-of-a-d4d4bbb8 #OffSeq #OPNsense #Vuln #RCE
View original postRelated Resources
Details
- CVE ID
- CVE-2026-44193
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- remote_code_execution
- Status
- unconfirmed
- EPSS
- 23.2%
- Social Posts
- 4
CWE
- CWE-88
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H