CVE-2026-3587

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.
Configurations

No configuration.

History

24 Mar 2026, 08:16

Type Values Removed Values Added
Summary (en) An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface and gain root access to the underlying Linux based OS, leading to full compromise of the device. (en) An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.

23 Mar 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 08:16

Updated : 2026-03-24 08:16


NVD link : CVE-2026-3587

Mitre link : CVE-2026-3587

CVE.ORG link : CVE-2026-3587


JSON object : View

Products Affected

No product.

CWE
CWE-912

Hidden Functionality