Back to VulnFeed / CVE-2026-7785
root@hackertop:~/vulnfeed/CVE-2026-7785#
CVE-2026-7785 MEDIUM Command Injection ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

A-G-U-P-T-A wireshark-mcp pyshark_mcp.py quick_capture os command injection

wireshark-mcp 16d ago Impact pending confirmation
LIFECYCLE
6.6 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability has been found in A-G-U-P-T-A wireshark-mcp edaf604416fbc94a201b4043092d4a1b09a12275/400c3da70074f22f3cce7ccb65304cafc7089c89 (Packet Analyzer Software) and classified as critical. Affected by this vulnerability is the function quick_capture of the file pyshark_mcp.py. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-78. The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Impact: As an impact it is known to affect confidentiality, integrity, and availability.

Exploit: It is possible to download the exploit at github.com. It is declared as proof-of-concept. The project was informed of the problem early through an issue report but has not responded yet.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7785 · CVSS 6.6 · Active Threat