Description
An OS command injection vulnerability in the /stream-to-vlc Express route in hitarth-gg Zenshin before 2.7.0 allows remote attackers to execute arbitrary commands via the url parameter.
Published: 2026-05-19
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability occurs in the /stream-to-vlc Express route of the Zenshin application. An attacker can supply a specially crafted url parameter that is directly used in an OS shell command without proper sanitization. As a result, the attacker can execute arbitrary commands on the host running Zenshin, leading to full compromise of the system. The weakness corresponds to OS Command Injection (CWE-78).

Affected Systems

The flaw affects all instances of Zenshin prior to version 2.7.0, including the source distributed under the GitHub repository hitarth-gg/zenshin. The route is exposed on all network interfaces that the Express server listens on, so a remote attacker with network reach to the Zenshin instance could exploit the vulnerability.

Risk and Exploitability

With a CVSS score of 9.8, the vulnerability is severe, providing remote code execution. The KEV status is not listed, and the EPSS score is <1%, indicating a low but nonzero exploitation probability. An attacker can craft a request to /stream-to-vlc?url=COMMAND; the application spawns the shell, creating a straightforward exploitation path. Therefore, any Zenshin instance exposed to untrusted users should be hardened immediately.

Generated by OpenCVE AI on May 20, 2026 at 17:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Zenshin to version 2.7.0 or later, which sanitizes the url parameter.
  • If an upgrade is not feasible, restrict network access to the /stream-to-vlc endpoint to trusted hosts only or implement IP whitelisting.
  • Validate and escape all input parameters that are used in OS shell commands, following input validation practices for OS Command Injection.

Generated by OpenCVE AI on May 20, 2026 at 17:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title OS Command Injection in Zenshin Express Route Enables Remote Command Execution

Wed, 20 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Hitarth-gg
Hitarth-gg zenshin
Vendors & Products Hitarth-gg
Hitarth-gg zenshin

Tue, 19 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title OS Command Injection in Zenshin Express Route Enables Remote Command Execution
Weaknesses CWE-78

Tue, 19 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability in the /stream-to-vlc Express route in hitarth-gg Zenshin before 2.7.0 allows remote attackers to execute arbitrary commands via the url parameter.
References

Subscriptions

Hitarth-gg Zenshin
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-20T15:46:35.358Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37281

cve-icon Vulnrichment

Updated: 2026-05-20T15:09:04.939Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T16:16:21.420

Modified: 2026-05-20T17:16:21.467

Link: CVE-2026-37281

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T17:30:35Z

Weaknesses