Skip to content
CVSS 7.3 · HIGH

CVE-2026-6987

A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.

View on NVD

Analysis

This vulnerability allows for remote command injection in the PicoClaw Web Launcher Management Plane. However, PicoClaw is a niche tool specific to Sipeed hardware and is not widely used within the general web, mobile, or backend development stack.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-74CWE-77

EPSS

Probability of exploitation (next 30 days): 0.0020 (0.2%)
Percentile: 41.5%
EPSS: 2026-05-06

Affects

sipeed:picoclaw

Technical description

A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.

Published: 4/25/2026, 5:16:33 PM
Last modified: 5/1/2026, 8:24:30 PM

References

HomeEventsBlogResourcesTeam