CVE-2026-2035: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Deciso OPNsense
CVE-2026-2035 is an OS command injection vulnerability in Deciso OPNsense version 25. 7, specifically in the diag_backup. php file handling backup configuration filenames. It allows authenticated network-adjacent attackers to execute arbitrary code with root privileges due to improper validation of user-supplied input used in system calls. Exploitation does not require user interaction but does require high-level privileges (authentication). The vulnerability impacts confidentiality, integrity, and availability of affected systems. No known exploits are currently reported in the wild. The CVSS score is 6. 8 (medium severity). Organizations using OPNsense 25.
AI Analysis
Technical Summary
CVE-2026-2035 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) affecting Deciso OPNsense version 25.7. The flaw resides in the diag_backup.php script responsible for handling backup configuration files. Specifically, the vulnerability arises because the application fails to properly validate or sanitize a user-supplied filename parameter before incorporating it into a system call. An authenticated attacker with network adjacency can exploit this weakness to inject arbitrary OS commands, which are executed with root privileges. This leads to remote code execution (RCE) on the affected device. The vulnerability requires authentication (high privileges) but no additional user interaction. The impact spans confidentiality, integrity, and availability, as arbitrary code execution at root level can lead to full system compromise, data theft, or disruption of network services. Although no public exploits have been reported yet, the severity and root-level access potential make this a critical concern for organizations relying on OPNsense for firewall and routing functions. The CVSS 3.0 vector (AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) reflects that the attack is network-adjacent, requires low attack complexity, high privileges, no user interaction, and impacts all three security properties severely. No patches or mitigations are currently linked, emphasizing the need for vendor response and user vigilance.
Potential Impact
The vulnerability allows an authenticated attacker to execute arbitrary commands as root on OPNsense devices, potentially leading to complete system compromise. This can result in unauthorized access to sensitive network configurations, interception or manipulation of network traffic, disruption of firewall or routing services, and persistent backdoors for further attacks. Organizations relying on OPNsense for perimeter security or internal segmentation may face significant risks including data breaches, service outages, and lateral movement within networks. The root-level execution capability amplifies the impact, as attackers can disable security controls, exfiltrate data, or pivot to other systems. Given OPNsense's use in enterprise, government, and critical infrastructure environments, exploitation could have severe operational and reputational consequences. Although exploitation requires authentication, insider threats or compromised credentials increase the risk. The absence of known exploits in the wild currently limits immediate widespread impact but does not reduce the urgency of mitigation.
Mitigation Recommendations
1. Immediately restrict access to OPNsense management interfaces to trusted administrators and secure networks only, minimizing exposure to network-adjacent attackers. 2. Enforce strong authentication mechanisms and regularly audit user accounts to prevent credential compromise. 3. Monitor logs for unusual activity related to backup configuration operations or unexpected command executions. 4. Apply vendor patches or updates as soon as they become available; if no patch exists, consider temporary workarounds such as disabling the vulnerable diag_backup.php functionality or restricting its access. 5. Implement network segmentation to isolate OPNsense devices from less trusted network segments. 6. Use application-layer firewalls or intrusion detection systems to detect and block suspicious command injection attempts targeting backup filename parameters. 7. Conduct regular security assessments and penetration tests focusing on administrative interfaces to identify similar injection flaws. 8. Educate administrators on the risks of command injection and the importance of input validation and least privilege principles.
Affected Countries
United States, Germany, Netherlands, United Kingdom, Canada, Australia, France, Japan, South Korea, Singapore
CVE-2026-2035: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Deciso OPNsense
Description
CVE-2026-2035 is an OS command injection vulnerability in Deciso OPNsense version 25. 7, specifically in the diag_backup. php file handling backup configuration filenames. It allows authenticated network-adjacent attackers to execute arbitrary code with root privileges due to improper validation of user-supplied input used in system calls. Exploitation does not require user interaction but does require high-level privileges (authentication). The vulnerability impacts confidentiality, integrity, and availability of affected systems. No known exploits are currently reported in the wild. The CVSS score is 6. 8 (medium severity). Organizations using OPNsense 25.
AI-Powered Analysis
Technical Analysis
CVE-2026-2035 is a vulnerability classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) affecting Deciso OPNsense version 25.7. The flaw resides in the diag_backup.php script responsible for handling backup configuration files. Specifically, the vulnerability arises because the application fails to properly validate or sanitize a user-supplied filename parameter before incorporating it into a system call. An authenticated attacker with network adjacency can exploit this weakness to inject arbitrary OS commands, which are executed with root privileges. This leads to remote code execution (RCE) on the affected device. The vulnerability requires authentication (high privileges) but no additional user interaction. The impact spans confidentiality, integrity, and availability, as arbitrary code execution at root level can lead to full system compromise, data theft, or disruption of network services. Although no public exploits have been reported yet, the severity and root-level access potential make this a critical concern for organizations relying on OPNsense for firewall and routing functions. The CVSS 3.0 vector (AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) reflects that the attack is network-adjacent, requires low attack complexity, high privileges, no user interaction, and impacts all three security properties severely. No patches or mitigations are currently linked, emphasizing the need for vendor response and user vigilance.
Potential Impact
The vulnerability allows an authenticated attacker to execute arbitrary commands as root on OPNsense devices, potentially leading to complete system compromise. This can result in unauthorized access to sensitive network configurations, interception or manipulation of network traffic, disruption of firewall or routing services, and persistent backdoors for further attacks. Organizations relying on OPNsense for perimeter security or internal segmentation may face significant risks including data breaches, service outages, and lateral movement within networks. The root-level execution capability amplifies the impact, as attackers can disable security controls, exfiltrate data, or pivot to other systems. Given OPNsense's use in enterprise, government, and critical infrastructure environments, exploitation could have severe operational and reputational consequences. Although exploitation requires authentication, insider threats or compromised credentials increase the risk. The absence of known exploits in the wild currently limits immediate widespread impact but does not reduce the urgency of mitigation.
Mitigation Recommendations
1. Immediately restrict access to OPNsense management interfaces to trusted administrators and secure networks only, minimizing exposure to network-adjacent attackers. 2. Enforce strong authentication mechanisms and regularly audit user accounts to prevent credential compromise. 3. Monitor logs for unusual activity related to backup configuration operations or unexpected command executions. 4. Apply vendor patches or updates as soon as they become available; if no patch exists, consider temporary workarounds such as disabling the vulnerable diag_backup.php functionality or restricting its access. 5. Implement network segmentation to isolate OPNsense devices from less trusted network segments. 6. Use application-layer firewalls or intrusion detection systems to detect and block suspicious command injection attempts targeting backup filename parameters. 7. Conduct regular security assessments and penetration tests focusing on administrative interfaces to identify similar injection flaws. 8. Educate administrators on the risks of command injection and the importance of input validation and least privilege principles.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- zdi
- Date Reserved
- 2026-02-06T01:11:13.876Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6998e0efbe58cf853bd8652f
Added to database: 2/20/2026, 10:32:15 PM
Last enriched: 2/20/2026, 10:48:30 PM
Last updated: 2/21/2026, 4:00:12 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65995: CWE-209 Generation of Error Message Containing Sensitive Information in Apache Software Foundation Apache Airflow
HighCVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.