Description
emp3r0r is a stealth-focused C2 designed by Linux users for Linux environments. Prior to 3.21.1, untrusted agent metadata (Transport, Hostname) is accepted during check-in and later interpolated into tmux shell command strings executed via /bin/sh -c. This enables command injection and remote code execution on the operator host. This vulnerability is fixed in 3.21.1.
Published: 2026-02-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

emp3r0r permits an attacker who can insert untrusted agent metadata, such as Transport or Hostname, during a check‑in operation to inject arbitrary shell commands into tmux session startup strings. The vulnerable code concatenates the metadata into a shell command executed via /bin/sh -c, providing a classic command injection path that ultimately yields remote code execution on the operator's Linux host. This vulnerability can compromise confidentiality, integrity, and availability of the operator's systems, and is rooted in CWE‑77 and CWE‑78.

Affected Systems

All releases of the emp3r0r command‑and‑control client from the jm33‑m0 project prior to version 3.21.1 are affected. Versions 3.21.1 and newer include the fix that sanitizes or removes untrusted metadata before it is used in tmux command strings. The affected product is the emp3r0r agent for Linux environments.

Risk and Exploitability

The CVSS v3 score of 9.3 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests that exploitation is rare at present. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating no documented exploitation yet. Exploitation requires an attacker to control or influence the metadata sent by an agent during check‑in, which is typically possible if they can compromise a compromised host or supply custom agents. If successful, the injection occurs through the operator's tmux session, allowing the attacker to execute arbitrary commands on the host. Users of older emp3r0r versions should consider this a high‑risk exposure, especially in environments where operators rely on tmux for session management.

Generated by OpenCVE AI on April 17, 2026 at 19:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update emp3r0r to version 3.21.1 or later to apply the vendor patch.
  • If an immediate upgrade is not possible, implement validation that rejects or sanitizes Transport and Hostname metadata before it is incorporated into tmux command strings, for example by allowing only a whitelist of trusted values.
  • As a temporary containment measure, limit the operator host's ability to execute /bin/sh -c with unsanitized input, or isolate tmux sessions from untrusted metadata by running them under a non‑privileged, restricted user account.

Generated by OpenCVE AI on April 17, 2026 at 19:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jm33-m0:emp3r0r:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Jm33-m0
Jm33-m0 emp3r0r
Vendors & Products Jm33-m0
Jm33-m0 emp3r0r

Fri, 13 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description emp3r0r is a stealth-focused C2 designed by Linux users for Linux environments. Prior to 3.21.1, untrusted agent metadata (Transport, Hostname) is accepted during check-in and later interpolated into tmux shell command strings executed via /bin/sh -c. This enables command injection and remote code execution on the operator host. This vulnerability is fixed in 3.21.1.
Title emp3r0r Agent-Controlled Metadata to Operator RCE (tmux Command Injection)
Weaknesses CWE-77
CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-13T17:17:57.660Z

Reserved: 2026-02-10T18:01:31.900Z

Link: CVE-2026-26068

cve-icon Vulnrichment

Updated: 2026-02-13T17:17:51.518Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-12T22:16:06.507

Modified: 2026-02-25T15:47:26.743

Link: CVE-2026-26068

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:00:09Z

Weaknesses