Impact
The vulnerability is an improper neutralization of special elements used in a command, allowing a crafted network request to inject arbitrary commands into the system. This flaw enables an attacker to execute arbitrary shell commands on the host running Owl opds, compromising confidentiality, integrity, and availability of the affected device and any connected systems. The weakness matches CWE‑77.
Affected Systems
The flaw affects Owl Cyberdefense’s Owl opds product, specifically version 2.2.0.4. No other versions are listed as vulnerable, but the confirmed exploit targets the 2.2.0.4 build.
Risk and Exploitability
The CVSS v3.1 score of 8.7 indicates a high severity level. The EPSS estimate is below 1 %, suggesting that exploit attempts are currently rare, and the vulnerability is not included in the CISA KEV catalog. The likely attack vector is a remote network request that reaches the vulnerable endpoint, requiring only network connectivity to the affected system.
OpenCVE Enrichment