top of page
perceptive_background_267k.jpg

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. From 5.0.0 to 6.10.1, OpenC3 COSMOS cont…

Published:

12 januari 2026 om 23:00:00

Alert date:

13 januari 2026 om 20:04:16

Source:

nvd.nist.gov

Click to open the original link from this advisory

Critical Infrastructure, Web Technologies

OpenC3 COSMOS versions 5.0.0 to 6.10.1 contain a critical remote code execution vulnerability in the JSON-RPC API. The vulnerability occurs when attacker-controlled parameter text is parsed using String#convert_to_value, which executes eval() for array-like inputs. Unauthenticated attackers can trigger Ruby code execution through the cmd code path before authorization checks occur. The vulnerability affects embedded systems command and control functionality. Fixed in version 6.10.2.

Technical details

Mitigation steps:

Affected products:

OpenC3 COSMOS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page