


Perceptive Security
SOC/SIEM Consultancy

A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via un…
Published:
2 maart 2026 om 23:00:00
Alert date:
3 maart 2026 om 22:05:24
Source:
nvd.nist.gov
Supply Chain & Dependencies, Web Technologies
A command injection vulnerability exists in the szc script of the ccurtsinger/stabilizer GitHub repository. The vulnerability allows remote attackers to execute arbitrary system commands through unsanitized user input. The flaw occurs when command-line arguments are directly concatenated into shell commands without proper validation and passed to os.system(). This represents a critical security issue that could allow complete system compromise through malicious input manipulation.
Technical details
Mitigation steps:
Affected products:
ccurtsinger/stabilizer
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-52365
https://github.com/ccurtsinger/stabilizer/
https://github.com/ccurtsinger/stabilizer/blob/master/szc
https://github.com/h1dr1/CVE_Research/blob/main/CVE-2025-52365.md
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
