Metrics
Affected Vendors & Products
Fri, 01 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sipeed:picoclaw:*:*:*:*:*:go:*:* |
Mon, 27 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sipeed
Sipeed picoclaw |
|
| Vendors & Products |
Sipeed
Sipeed picoclaw |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | PicoClaw Web Launcher Management Plane restart command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-04-25T16:45:09.726Z
Updated: 2026-04-27T13:34:16.415Z
Reserved: 2026-04-24T19:16:31.247Z
Link: CVE-2026-6987
Updated: 2026-04-27T13:20:24.583Z
Status : Analyzed
Published: 2026-04-25T17:16:33.870
Modified: 2026-05-01T20:24:30.653
Link: CVE-2026-6987
No data.
ReportizFlow