提出 #796336: PicoClaw V0.2.4 Command execution情報

タイトルPicoClaw V0.2.4 Command execution
説明The unauthenticated Web Launcher management plane can directly change the config.json, write any hooks.processes[*].command into it, and then restart the gateway through the unauthenticated POST /api/gateway/restart. When the gateway starts, this command is immediately started as a process hook, forming a stable RCE This vulnerability can directly result in unauthenticated remote code execution under the following conditions. The target launches picoclaw-launcher -public or the launcher is deployed as an accessible management plane in the same CIDR segment and allowed_cidrs is empty, or the attacker IP is within the allowed range
ソース⚠️ https://github.com/sipeed/picoclaw/issues/2307
ユーザー
 AiSec (UID 97073)
送信2026年04月03日 10:49 (22 日 ago)
モデレーション2026年04月24日 21:16 (21 days later)
ステータス承諾済み
VulDBエントリ359530 [PicoClaw 迄 0.2.4 Web Launcher Management Plane /api/gateway/restart 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!