CVE-2026-43944
Published: 08 May 2026
Summary
CVE-2026-43944 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Electerm Project Electerm. Its CVSS base score is 9.6 (Critical).
Operationally, ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Isolated execution prevents functionality from an untrusted sphere from affecting the real environment, allowing safe behavioral inspection.
Directly implements checks on information inputs to reject invalid data before processing.
Limiting P2P file sharing technology reduces inclusion of functionality or resources from untrusted external control spheres.
Enforcing installation policies prevents users from including functionality obtained from untrusted control spheres.
The inventory process requires identifying and recording the origin of all components, making inclusion of functionality from untrusted control spheres easier to detect during reviews.
Requiring approval and monitoring of maintenance tools prevents inclusion and execution of functionality obtained from untrusted sources.
Unowned portable devices represent untrusted control spheres; the prohibition prevents inclusion of functionality or data from such sources.
Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.
NVD Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command…
more
that launches electerm with attacker-controlled opts. This issue has been patched in version 3.8.15.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)