Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2629: OS Command Injection in jishi node-sonos-http-api

0
Medium
VulnerabilityCVE-2026-2629cvecve-2026-2629
Published: Tue Feb 17 2026 (02/17/2026, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: jishi
Product: node-sonos-http-api

Description

A weakness has been identified in jishi node-sonos-http-api up to 3776f0ee2261c924c7b7204de121a38100a08ca7. Affected is the function Promise of the file lib/tts-providers/mac-os.js of the component TTS Provider. This manipulation of the argument phrase causes os command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 02/17/2026, 22:29:50 UTC

Technical Analysis

The vulnerability CVE-2026-2629 affects the jishi node-sonos-http-api project, a popular open-source API for controlling Sonos speakers. The flaw is located in the TTS Provider component, specifically in the mac-os.js file's Promise function. This function improperly handles the 'phrase' argument, which is used to generate text-to-speech output on macOS systems. Due to insufficient input sanitization, an attacker can inject arbitrary OS commands into this argument, leading to command injection. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly accessible to attackers. The project employs a rolling release model, complicating version tracking and patch management; no official fix or patch has been released, and the vendor has not responded to the vulnerability report. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently in the wild, the public availability of exploit details increases the risk of exploitation. The vulnerability could allow attackers to execute arbitrary commands on affected systems, potentially leading to data theft, system compromise, or denial of service. Given the integration with Sonos devices and macOS TTS capabilities, environments using these technologies are particularly vulnerable.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those deploying Sonos speaker systems integrated with node-sonos-http-api on macOS platforms. Successful exploitation could lead to unauthorized command execution, resulting in data breaches, disruption of services, or lateral movement within networks. The impact extends to confidentiality, integrity, and availability of affected systems. Organizations in sectors with high adoption of smart home or IoT technologies, such as residential service providers, hospitality, and corporate offices using Sonos for audio management, are at increased risk. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential attacks. Additionally, the remote and unauthenticated nature of the exploit means attackers can target systems over the internet or local networks without needing credentials, raising the threat level. This could also facilitate supply chain attacks if integrated into larger automation or orchestration frameworks. The vulnerability's medium severity rating reflects these risks but also the partial impact on system components.

Mitigation Recommendations

European organizations should implement immediate input validation and sanitization on all user-supplied data passed to the TTS Provider component, particularly the 'phrase' argument in mac-os.js. Network segmentation should be enforced to limit exposure of node-sonos-http-api endpoints to untrusted networks. Employ application-layer firewalls or intrusion detection systems to monitor and block suspicious command injection patterns. Organizations should audit their deployments to identify usage of node-sonos-http-api and assess exposure. If possible, disable or restrict TTS Provider functionality on macOS systems until a patch or official fix is released. Consider containerizing or sandboxing the API service to limit the impact of potential command execution. Regularly monitor vulnerability disclosures and community repositories for updates or unofficial patches. Engage with the open-source project maintainers or community to encourage timely remediation. Finally, implement robust logging and alerting to detect anomalous command executions or API requests indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-17T13:47:54.918Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6994e88380d747be20dc67c4

Added to database: 2/17/2026, 10:15:31 PM

Last enriched: 2/17/2026, 10:29:50 PM

Last updated: 2/21/2026, 12:17:32 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats