Back to VulnFeed / CVE-2026-44601
root@hackertop:~/vulnfeed/CVE-2026-44601#
CVE-2026-44601 LOW RCE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Tor up to 0.4.9.7 improper enforcement of a single, unique action

Tor 14d ago Impact pending confirmation
LIFECYCLE
3.7 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Tor up to 0.4.9.7 (Network Encryption Software). It has been classified as problematic. Affected is an unknown code. Upgrading to version 0.4.9.7 eliminates this vulnerability. Applying the patch d4e3f6a440b58c2be661decf20c09548704907dc is able to eliminate this problem. The bugfix is ready for download at gitlab.torproject.org. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
CWE is classifying the issue as CWE-837. The product requires that an actor should only be able to perform an action once, or to have only one unique action, but the product does not enforce or improperly enforces this restriction.

Impact: This is going to have an impact on availability.

Countermeasure: Upgrading to version 0.4.9.7 eliminates this vulnerability. Applying the patch d4e3f6a440b58c2be661decf20c09548704907dc is able to eliminate this problem. The bugfix is ready for download at gitlab.torproject.org. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-44601 · CVSS 3.7 · Active Threat