CVE-2026-6987
A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.
View on NVDAnalysis
This vulnerability allows for remote command injection in the PicoClaw Web Launcher Management Plane. However, PicoClaw is a niche tool specific to Sipeed hardware and is not widely used within the general web, mobile, or backend development stack.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LCWE-74CWE-77EPSS
Affects
sipeed:picoclawTechnical description
A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.