Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-5166 β€” AI Deep Analysis Summary

CVSS 9.6 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A **Path Traversal** flaw in Pardus Software Center. πŸ“‰ **Consequences**: Attackers can access files outside the intended directory, leading to potential **Data Theft** or **System Compromise**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-22** (Improper Limitation of a Pathname to a Restricted Directory).…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: TÜBΔ°TAK BΔ°LGEM (Turkey). πŸ“¦ **Product**: Pardus Software Center. ⚠️ **Affected Versions**: **1.0.3 and earlier**. If you are running v1.0.2 or below, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: High impact. CVSS Score indicates **High** Confidentiality, Integrity, and Availability impact.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Low**. βš™οΈ **Auth**: No privileges required (PR:N). πŸ–±οΈ **UI**: Requires User Interaction (UI:R). 🌐 **Network**: Network exploitable (AV:N).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: **No**. The `pocs` field is empty. πŸ“œ **Reference**: Only a third-party advisory from USOM (Turkish National Cyber Security Incident Response Team) exists. No public PoC code is available yet.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your installed version. πŸ“‹ **Action**: Open Pardus Software Center β†’ Settings/About. If version < **1.0.3**, you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: Yes. Upgrade to **version 1.0.4 or later**. πŸ“₯ **Source**: Refer to the USOM advisory link for official patch details. The vendor has acknowledged the issue and released a fix.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If you cannot patch immediately: 1. **Disable** the Software Center service if not needed. 2. **Restrict** network access to the application. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **High**. πŸ“… **Published**: April 2026. πŸ“ˆ **Risk**: CVSS Vector shows **Critical** potential impact (C:H, I:H, A:H).…