CVE-2026-6204
Received Received - Intake
Authenticated Remote Code Execution in LibreNMS Binary Locations Feature

Publication date: 2026-04-13

Last updated on: 2026-04-22

Assigner: ab69c47f-b95e-4bf2-b2d9-4b1fd1b24b4a

Description
LibreNMS versions before 26.3.0 are affected by an authenticated remote code execution vulnerability by abusing the Binary Locations config and the Netcommand feature. Successful exploitation requires administrative privileges. Exploitation could result in compromise of the underlying web server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
librenms librenms to 26.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-6204 is a high-severity authenticated remote code execution (RCE) vulnerability affecting LibreNMS versions before 26.3.0. It arises from insufficient validation of configurable binary paths for built-in network diagnostic tools, which administrators can set via the WebUI.

An attacker with administrative privileges can change the binary path of a network tool (such as whois) to a malicious executable like wget or bash. By exploiting a bypass in the input filter that is supposed to restrict arguments to valid IP addresses or hostnames, the attacker can download and execute arbitrary scripts on the LibreNMS server.

This vulnerability allows execution of arbitrary code on the host server, potentially leading to full system compromise.


How can this vulnerability impact me? :

Successful exploitation of this vulnerability can lead to full compromise of the underlying web server running LibreNMS.

  • An attacker can execute arbitrary code on the server.
  • Sensitive system information can be exposed or exfiltrated.
  • The attacker can perform lateral movement within the network.
  • The integrity and availability of the LibreNMS service and the host system can be severely impacted.

However, exploitation requires valid administrator credentials, limiting the risk to trusted users but still posing significant threats in environments with multiple admins.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves verifying if your LibreNMS installation is running a vulnerable version prior to 26.3.0 and checking if the Binary Locations configuration has been altered to point to unexpected binaries.

You can inspect the configured binary paths for network diagnostic tools (e.g., whois) via the WebUI at /settings/external/binaries or by querying the configuration files if accessible.

To detect potential exploitation, you can look for unusual commands executed by LibreNMS or unexpected network activity such as downloads of scripts from external servers.

Suggested commands to check the binary paths and running processes might include:

  • Check the binary path configuration in the LibreNMS database or config files.
  • Use commands like `ps aux | grep librenms` to see if any suspicious processes are running.
  • Monitor network connections with `netstat -tulnp` or `ss -tulnp` to detect unexpected outbound connections.
  • Check web server logs for requests to `/ajax/netcmd` with unusual parameters.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade LibreNMS to version 26.3.0 or later, where this vulnerability is patched.

If upgrading immediately is not feasible, remove or disable the ability for administrators to configure binary paths via the WebUI and instead load these paths from a secure configuration file.

Implement stricter validation on the input filter that validates command arguments, specifically fixing the ip_or_hostname validation logic to prevent bypasses.

Limit administrative access to trusted users only, as exploitation requires valid administrator credentials.

Monitor and audit the Binary Locations configuration and usage of the /ajax/netcmd endpoint for suspicious activity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-6204 allows an authenticated administrator to execute arbitrary code on the LibreNMS server, potentially leading to full system compromise, data exfiltration, and lateral movement within the network.

Such a compromise could result in unauthorized access to sensitive data, which may violate data protection regulations such as GDPR and HIPAA that require safeguarding personal and health information.

Because exploitation requires administrative privileges, the vulnerability highlights risks in environments with multiple trusted users, where an attacker gaining admin access could bypass controls designed to protect regulated data.

Therefore, this vulnerability poses a significant risk to compliance with common standards and regulations by potentially enabling unauthorized data access and system control.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart