Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-40032
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
UAC < 3.3.0-rc1 Command Injection via Placeholder Substitution
Source: NVD (National Vulnerability Database)
Vulnerability Description
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
uac 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
uac是Thiago Canozzo Lahr个人开发者的一个Unix系统取证与事件响应工具。 UAC 3.3.0-rc1之前版本存在操作系统命令注入漏洞,该漏洞源于_run_command()函数将构建的命令字符串直接传递给eval而未进行适当清理,可能导致通过攻击者控制的输入注入shell元字符或命令替换,从而执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
tclahrUAC 0 ~ 3.2.0 -
II. Public POCs for CVE-2026-40032
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-40032
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-40032

No comments yet


Leave a comment