Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CWE-77 (在命令中使用的特殊元素转义处理不恰当(命令注入)) — Vulnerability Class 1202

1202 vulnerabilities classified as CWE-77 (在命令中使用的特殊元素转义处理不恰当(命令注入)). AI Chinese analysis included.

CWE-77 represents a critical input validation weakness where software constructs commands using untrusted data without properly sanitizing special characters. Attackers typically exploit this by injecting malicious payloads, such as semicolons or pipe operators, into user-supplied fields to alter the intended command structure. This allows them to execute arbitrary system commands, potentially leading to full system compromise, data exfiltration, or denial of service. To prevent such vulnerabilities, developers must strictly validate and sanitize all external inputs, ensuring that only expected data formats are processed. Utilizing parameterized APIs or safe command execution libraries instead of direct string concatenation significantly reduces risk. Additionally, implementing the principle of least privilege for application processes limits the potential impact of successful injection attempts, thereby enhancing overall system security against command injection attacks.

MITRE CWE Description
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attacks.
Common Consequences (1)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If a malicious user injects a character (such as a semi-colon) that delimits the end of one command and the beginning of another, it may be possible to then insert an entirely new and unrelated command that was not intended to be executed. This gives an attacker a privilege or capability that they w…
Mitigations (5)
Architecture and DesignIf at all possible, use library calls rather than external processes to recreate the desired functionality.
ImplementationIf possible, ensure that all external commands called from the program are statically created.
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
OperationRun time: Run time policy enforcement may be used in an allowlist fashion to prevent use of any non-sanctioned commands.
System ConfigurationAssign permissions that prevent the user from accessing/opening privileged files.
Examples (2)
Consider a "CWE Differentiator" application that uses an an LLM generative AI based "chatbot" to explain the difference between two weaknesses. As input, it accepts two CWE IDs, constructs a prompt string, sends the prompt to the chatbot, and prints the results. The prompt string effectively acts as a command to the chatbot component. Assume that invokeChatbot() calls the chatbot and returns the …
prompt = "Explain the difference between {} and {}".format(arg1, arg2) result = invokeChatbot(prompt) resultHTML = encodeForHTML(result) print resultHTML
Bad · Python
Explain the difference between CWE-77 and CWE-78
Informative
Consider the following program. It intends to perform an "ls -l" on an input filename. The validate_name() subroutine performs validation on the input to make sure that only alphanumeric and "-" characters are allowed, which avoids path traversal (CWE-22) and OS command injection (CWE-78) weaknesses. Only filenames like "abc" or "d-e-f" are intended to be allowed.
my $arg = GetArgument("filename"); do_listing($arg); sub do_listing { my($fname) = @_; if (! validate_name($fname)) { print "Error: name is not well-formed!\n"; return; } # build command my $cmd = "/bin/ls -l $fname"; system($cmd); } sub validate_name { my($name) = @_; if ($name =~ /^[\w\-]+$/) { return(1); } else { return(0); } }
Bad · Perl
if ($name =~ /^\w[\w\-]+$/) ...
Good · Perl
CVE IDTitleCVSSSeverityPublished
CVE-2026-3066 HummerRisk Cloud Compliance Scanning PlatformUtils.java fixedCommand command injection — HummerRisk 6.3 Medium2026-02-24
CVE-2026-3065 HummerRisk Cloud Task Dry-run CloudTaskService.java CommandUtils.commonExecCmdWithResult command injection — HummerRisk 6.3 Medium2026-02-24
CVE-2026-3064 HummerRisk Cloud Task Scheduler ResourceCreateService.java command injection — HummerRisk 6.3 Medium2026-02-24
CVE-2026-2956 qinming99 dst-admin restore revertBackup command injection — dst-admin 6.3 Medium2026-02-22
CVE-2026-26093 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Owl opds — opds 9.8AICriticalAI2026-02-20
CVE-2026-2333 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Owl opds — opds 9.8AICriticalAI2026-02-20
CVE-2026-20761 EnOcean SmartServer IoT Command Injection — SmartServer IoT 8.1 High2026-02-20
CVE-2026-2824 Comfast CF-E7 webmggnt mbox-config sub_441CF4 command injection — CF-E7 6.3 Medium2026-02-20
CVE-2026-2823 Comfast CF-E7 webmggnt mbox-config sub_41ACCC command injection — CF-E7 6.3 Medium2026-02-20
CVE-2026-27001 OpenClaw: Unsanitized CWD path injection into LLM prompts — openclaw 7.6 -2026-02-19
CVE-2025-33249 NVIDIA Nemo Framework 命令注入漏洞 — NeMo Framework 7.8 High2026-02-18
CVE-2025-33246 NVIDIA Nemo Framework 命令注入漏洞 — NeMo Framework 7.8 High2026-02-18
CVE-2026-22284 Dell SmartFabric OS10 Software 命令注入漏洞 — SmartFabric OS10 Software 6.6 Medium2026-02-17
CVE-2026-2615 Wavlink WL-NU516U1 firewall.cgi singlePortForwardDelete command injection — WL-NU516U1 7.2 High2026-02-17
CVE-2026-2548 WAYOS FBM-220G rc sub_40F820 command injection — FBM-220G 6.3 Medium2026-02-16
CVE-2026-2537 Comfast CF-E4 HTTP POST Request mbox-config command injection — CF-E4 4.7 Medium2026-02-16
CVE-2026-2535 Comfast CF-N1 V2 mbox-config sub_44AB9C command injection — CF-N1 V2 6.3 Medium2026-02-16
CVE-2026-2534 Comfast CF-N1 V2 mbox-config sub_44AC4C command injection — CF-N1 V2 6.3 Medium2026-02-16
CVE-2026-2533 Tosei Self-service Washing Machine tosei_datasend.php command injection — Self-service Washing Machine 7.3 High2026-02-16
CVE-2026-2530 Wavlink WL-WN579A3 wireless.cgi AddMac command injection — WL-WN579A3 6.3 Medium2026-02-16
CVE-2026-2529 Wavlink WL-WN579A3 wireless.cgi DeleteMac command injection — WL-WN579A3 6.3 Medium2026-02-16
CVE-2026-2528 Wavlink WL-WN579A3 wireless.cgi Delete_Mac_list command injection — WL-WN579A3 6.3 Medium2026-02-16
CVE-2026-2527 Wavlink WL-WN579A3 login.cgi command injection — WL-WN579A3 6.3 Medium2026-02-16
CVE-2026-2526 Wavlink WL-WN579A3 wireless.cgi multi_ssid command injection — WL-WN579A3 6.3 Medium2026-02-16
CVE-2026-26068 emp3r0r Agent-Controlled Metadata to Operator RCE (tmux Command Injection) — emp3r0r 8.8AIHighAI2026-02-12
CVE-2026-20841 Windows Notepad App Remote Code Execution Vulnerability — Windows Notepad 7.8 High2026-02-10
CVE-2026-21256 GitHub Copilot and Visual Studio Remote Code Execution Vulnerability — Microsoft Visual Studio 2022 version 17.14 8.8 High2026-02-10
CVE-2026-21257 GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability — Microsoft Visual Studio 2022 version 17.14 8.0 High2026-02-10
CVE-2026-21516 GitHub Copilot for Jetbrains Remote Code Execution Vulnerability — GitHub Copilot Plugin for JetBrains IDEs 8.8 High2026-02-10
CVE-2026-21522 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability — Microsoft ACI Confidential Containers 6.7 Medium2026-02-10

Vulnerabilities classified as CWE-77 (在命令中使用的特殊元素转义处理不恰当(命令注入)) represent 1202 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.