Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43901— Wireshark MCP: Arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured

CVSS 6.8 · Medium EPSS 0.04% · P13

Possible ATT&CK Techniques 1AI

T1059 · Command and Scripting Interpreter

Affected Version Matrix 1

VendorProductVersion RangeStatus
bx33661Wireshark-MCP<= 1.1.5affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43901

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Wireshark MCP: Arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured
Source: NVD (National Vulnerability Database)
Vulnerability Description
Wireshark MCP is an MCP Server that turns tshark into a structured analysis interface, then layers in optional Wireshark suite utilities. In 1.1.5 and earlier, wireshark-mcp exposes a wireshark_export_objects MCP tool that accepts an attacker-controlled dest_dir parameter and passes it to tshark's --export-objects flag with no mandatory path restriction. The path sandbox (_allowed_dirs) is None by default and only activates when the environment variable WIRESHARK_MCP_ALLOWED_DIRS is explicitly set. In a default installation, any directory on the filesystem can be used as the export destination.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wireshark MCP 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Wireshark MCP是Bpple个人开发者的一款网络数据包智能分析工具。 Wireshark MCP 1.1.5及之前版本存在路径遍历漏洞,该漏洞源于wireshark_export_objects MCP工具接受攻击者控制的dest_dir参数并将其传递给tshark的--export-objects标志而无强制路径限制,路径沙箱默认为None且仅当显式设置环境变量WIRESHARK_MCP_ALLOWED_DIRS时才激活,在默认安装中文件系统上的任何目录都可用作导出目标。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
bx33661Wireshark-MCP <= 1.1.5 -

II. Public POCs for CVE-2026-43901

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43901

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-43901

No comments yet


Leave a comment