Impact
A command injection flaw exists in the TinyZero project’s HDFS file operation utilities, where user‑controlled file paths are interpolated directly into shell commands without sanitization. An attacker can supply a crafted path via the Hydra configuration framework, causing the _copy() function to execute arbitrary OS commands. This yields remote code execution with the privileges of the process that runs TinyZero training. The vulnerability is identified as CWE‑78.
Affected Systems
The flaw resides in TinyZero, specifically the HDFS utilities added in the commit 6652a63c57fa7e5ccde3fc9c598c7176ff15b839 (2025‑58‑24). It affects any deployment of TinyZero that utilizes these utilities and processes file paths received from external configuration sources. The affected version information is not explicitly enumerated beyond the commit reference.
Risk and Exploitability
No CVSS score or EPSS value is presently available, and the vulnerability is not listed in CISA’s KEV catalog. The nature of the flaw supports remote code execution, implying a high intrinsic risk if an attacker can influence Hydra configuration or the file path supplied. Although exploitation likelihood cannot be quantified from the current data, the potential impact is severe, justifying urgent attention.
OpenCVE Enrichment