CVE-2026-27476
Published: 19 February 2026
Description
RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system commands to execute arbitrary operations on the target…
more
system, including reverse shell establishment and command execution.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation of hex-encoded inputs received over UDP port 5005 to prevent command injection exploits.
Requires timely remediation of the specific sanitization flaw in RustFly 2.0.0 via patching or upgrades.
Enforces boundary protections such as firewalls to block unauthorized inbound traffic to the exposed UDP port 5005.
Security SummaryAI
CVE-2026-27476 is a command injection vulnerability (CWE-78) in RustFly 2.0.0, published on 2026-02-19. The flaw exists in the software's remote UI control mechanism, which accepts hex-encoded instructions over UDP port 5005 without proper sanitization. This critical issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its potential for severe impact.
Remote, unauthenticated attackers can exploit the vulnerability by sending crafted hex-encoded payloads to UDP port 5005 on affected systems. No privileges or user interaction are required, enabling network-based attacks with low complexity. Successful exploitation grants arbitrary command execution on the target system, including reverse shell establishment and other malicious operations.
Mitigation guidance is available in related advisories, including those from VulnCheck at https://www.vulncheck.com/advisories/rustfly-command-injection-via-udp-remote-control and PacketStorm at https://packetstorm.news/files/id/215819/.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote unauthenticated command injection via UDP service, directly facilitating T1190 (Exploit Public-Facing Application) for initial access and T1059 (Command and Scripting Interpreter) for arbitrary command execution.