๐Ÿ” CVE Alert

CVE-2026-7785

HIGH 7.3

A-G-U-P-T-A wireshark-mcp pyshark_mcp.py quick_capture os command injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A security flaw has been discovered in A-G-U-P-T-A wireshark-mcp edaf604416fbc94a201b4043092d4a1b09a12275/400c3da70074f22f3cce7ccb65304cafc7089c89. This affects the function quick_capture of the file pyshark_mcp.py. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-78 CWE-77
Vendor a-g-u-p-t-a
Product wireshark-mcp
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for a-g-u-p-t-a wireshark-mcp

Be the first to know when new high vulnerabilities affecting a-g-u-p-t-a wireshark-mcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

A-G-U-P-T-A / wireshark-mcp
400c3da70074f22f3cce7ccb65304cafc7089c89 edaf604416fbc94a201b4043092d4a1b09a12275

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360985 vuldb.com: https://vuldb.com/vuln/360985/cti vuldb.com: https://vuldb.com/submit/807745 github.com: https://github.com/A-G-U-P-T-A/wireshark-mcp/issues/1 github.com: https://github.com/A-G-U-P-T-A/wireshark-mcp/

Credits

๐Ÿ” CPT_Penner (VulDB User) VulDB CNA Team