| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9c88-49p5-5ggf | Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sebhildebrandt
Sebhildebrandt systeminformation |
|
| Vendors & Products |
Sebhildebrandt
Sebhildebrandt systeminformation |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retry (lines 440-441) calls `getWifiNetworkListIw(iface)` with the **original unsanitized** `iface` value, which is passed directly to `execSync('iwlist ${iface} scan')`. Any application passing user-controlled input to `si.wifiNetworks()` is vulnerable to arbitrary command execution with the privileges of the Node.js process. Version 5.30.8 fixes the issue. | |
| Title | Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T21:21:38.406Z
Reserved: 2026-02-12T17:10:53.414Z
Link: CVE-2026-26280
Updated: 2026-02-19T20:57:38.295Z
Status : Awaiting Analysis
Published: 2026-02-19T20:25:43.880
Modified: 2026-02-20T13:49:47.623
Link: CVE-2026-26280
No data.
OpenCVE Enrichment
Updated: 2026-02-20T09:54:09Z
Github GHSA