Impact
The vulnerability allows an attacker with administrative privileges to execute arbitrary code on the LibreNMS web server by manipulating the Binary Locations configuration and leveraging the Netcommand feature. This authenticated remote code execution can compromise the underlying operating system and any services running on the host. The weakness is defined as command injection (CWE-78) and has a high severity score of 8.5, indicating broad impact if exploited.
Affected Systems
LibreNMS versions earlier than 26.3.0 are affected. The issue resides in the librenms:librenms product. Users running any pre-26.3.0 release are potentially vulnerable.
Risk and Exploitability
The CVSS score of 8.5 reflects a significant risk, though the EPSS score is not available. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, but it remains a high‑severity threat. An attacker must be authenticated with administrative rights to exploit the flaw, typically by logging into the web interface. Once authenticated, the attacker can trigger Netcommand executions that follow the configured binary paths, leading to arbitrary code execution on the host.
OpenCVE Enrichment
Github GHSA