Impact
A flaw in Owl CyberDefense opds 2.2.0.4 allows an attacker to inject and execute arbitrary commands through a crafted network request. This command injection results from improper neutralization of special elements used in command construction, giving attackers total control over the host, compromising confidentiality, integrity, and availability. The weakness is a classic Command Injection classified as CWE‑77.
Affected Systems
Affected products include Owl CyberDefense opds as indicated by the CPE entries for opds‑1000, opds‑100, and the specific 2.2.0.4 release of opds‑talon. Administrators should verify whether their deployment matches any of these identifiers to determine applicability.
Risk and Exploitability
The vulnerability carries a CVSS v3.1 score of 9.2, indicating critical severity. The EPSS score is less than 1%, suggesting a low current exploitation probability, yet the flaw is not yet listed in the CISA KEV catalog, meaning it could still be actively leveraged by skilled threat actors. The attack vector is remote over the network, requiring a crafted request directed at the opds service, which, if successful, grants attacker system‑level execution privileges.
OpenCVE Enrichment