CVE-2026-28517
CRITICAL WAF: High
CVSS 9.8
Published: 2026-02-27
CWE-78
openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
WAF Coverage Analysis
OS Command Injection
High WAF Coverage
OWASP: A03:2021 Injection
932xxx - Remote Code Execution
Affected Software
| Vendor | Product | Version |
|---|---|---|
| opendcim | opendcim | 23.04 |
References
- chocapikk.com (Third Party Advisory, Exploit)
- github.com (Exploit)
- github.com (Product)
- github.com (Product)
- github.com (Issue Tracking, Patch)
- github.com (Issue Tracking, Patch)
- www.vulncheck.com (Third Party Advisory)