Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-6349 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: HGiga iSherlock suffers from **OS Command Injection**. πŸ’₯ **Consequences**: Attackers can execute **arbitrary OS commands** on the target system, leading to total compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-78** (Improper Neutralization of Special Elements used in an OS Command). The software fails to sanitize user inputs before passing them to the OS.

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **HGiga** (China Hengji). πŸ“¦ **Product**: **iSherlock-base-4.5**. This applies to the specific software series produced by HGiga.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: **High Impact** (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Hackers gain **Full Control** (Confidentiality, Integrity, Availability: High). No privileges required.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **Low**. ⚑ **Network Accessible** (AV:N), **Low Complexity** (AC:L), **No Privileges** (PR:N), **No User Interaction** (UI:N). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exp?**: **No**. The `pocs` field is empty. While references exist, no specific Proof-of-Concept code is publicly available in this dataset.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **HGiga iSherlock** products. Look for **OS command injection** patterns in input fields. Use vulnerability scanners detecting **CWE-78**.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: **Unknown**. The data does not list a specific patch version or official mitigation steps. Check vendor advisories for updates.

Q9What if no patch? (Workaround)

🚧 **Workaround**: **Input Sanitization**. Strictly validate and escape all user inputs. Implement **Whitelisting** for allowed commands. Use **Least Privilege** principles.

Q10Is it urgent? (Priority Suggestion)

⚠️ **Urgency**: **Critical**. With **CVSS 9.8** (implied by H/H/H) and **Remote/No-Auth** access, immediate attention and mitigation are required to prevent system takeover.