SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 CWE-89 |
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system. | |
| Title | Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2026-05-12T19:05:21.357Z
Reserved: 2026-05-07T21:29:03.734Z
Link: CVE-2026-44860
No data.
Status : Received
Published: 2026-05-12T20:16:44.620
Modified: 2026-05-12T20:16:44.620
Link: CVE-2026-44860
No data.
OpenCVE Enrichment
Updated: 2026-05-12T21:15:29Z