Description
Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
Published: 2026-02-20
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Uncontrolled search path manipulation that can lead to execution of untrusted code or privilege escalation.
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in Owl Cyberdefense Opds 2.2.0.4 allows an attacker to manipulate the file search path through a crafted network request. By controlling the search path, a malicious actor could cause the system to load and execute unwanted or compromised binaries, potentially leading to code execution or privilege escalation on the affected device. The weakness is identified as a classic uncontrolled search path element, which can compromise confidentiality, integrity, and availability if an attacker gains the ability to execute arbitrary binaries.

Affected Systems

Products affected are Owl:opds, specifically the owlcyberdefense opds-1000 and opds-100 families, along with the opds-talon device running version 2.2.0.4. The vulnerability applies to hardware devices and embedded systems listed under these identifiers.

Risk and Exploitability

With a CVSS score of 8.4, the severity is high. The EPSS score of less than 1% indicates a low probability of exploitation in the wild at this time, and the vulnerability is not currently listed in the CISA KEV catalog. The attack vector is inferred to be remote, relying on network communication that carries the crafted request to the Opds device. No elevated privileges are required to exploit the flaw, so any network-accessible instance is a potential target.

Generated by OpenCVE AI on April 17, 2026 at 17:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade Owl Opds to a version that eliminates the search path manipulation flaw.
  • If a patch is unavailable, restrict inbound traffic to the Opds API endpoints that accept configuration changes, or implement a firewall rule allowing only trusted sources.
  • Ensure the device’s environment variables, especially PATH, are set to a secure, unmodifiable value and validate that no new paths can be introduced by external inputs.

Generated by OpenCVE AI on April 17, 2026 at 17:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Owlcyberdefense
Owlcyberdefense opds-100
Owlcyberdefense opds-1000
Owlcyberdefense opds-talon
CPEs cpe:2.3:h:owlcyberdefense:opds-1000:-:*:*:*:*:*:*:*
cpe:2.3:h:owlcyberdefense:opds-100:-:*:*:*:*:*:*:*
cpe:2.3:o:owlcyberdefense:opds-talon:2.2.0.4:*:*:*:*:*:*:*
Vendors & Products Owlcyberdefense
Owlcyberdefense opds-100
Owlcyberdefense opds-1000
Owlcyberdefense opds-talon
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Owl
Owl opds
Vendors & Products Owl
Owl opds

Fri, 20 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description Uncontrolled Search Path Element in Owl opds 2.2.0.4 allows Leveraging/Manipulating Configuration File Search Paths via a crafted network request.
Title Uncontrolled Search Path Element in Owl opds
Weaknesses CWE-427
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Owl Opds
Owlcyberdefense Opds-100 Opds-1000 Opds-talon
cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2026-02-20T23:03:43.825Z

Reserved: 2026-02-11T09:59:47.766Z

Link: CVE-2026-26097

cve-icon Vulnrichment

Updated: 2026-02-20T17:54:57.292Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T17:25:54.337

Modified: 2026-02-27T17:06:35.040

Link: CVE-2026-26097

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:30:23Z

Weaknesses