Impact
The pm2run function in the /rpc handler of elecV2P can execute arbitrary operating-system commands when supplied with manipulated input. An attacker able to reach the RPC endpoint can inject shell commands, potentially gaining full system compromise. The flaw exists in all releases up to 3.8.3. The vulnerability is specifically an OS command injection (CWE‑77/78) that compromises confidentiality, integrity, and availability.
Affected Systems
ElecV2 the elecV2P project is affected. The versions vulnerable are all releases published through 3.8.3. Earlier or later versions are not documented as impacted. The product is hosted on GitHub and actively maintained, but the maintainer has not yet issued a fix.
Risk and Exploitability
The CVSS rating is 6.9, indicating a medium severity impact. No EPSS score is published, and the issue is not in the CISA KEV catalog. The exploit code is publicly shared and the project has not yet released a patch, which increases the risk for anyone exposing the RPC endpoint over the network. Attackers can launch the injection remotely by sending crafted RPC requests, so systems that expose the endpoint to untrusted networks are at highest risk.
OpenCVE Enrichment