Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.8

Deciso OPNsense diag_backup PHP File Allows Network Attackers to Run Code

CVE-2026-2035
Summary

If not updated, attackers on the same network can use a specific file to run malicious code on your Deciso OPNsense system, even if they don't have a login. This can lead to unauthorized changes or data theft. Update your Deciso OPNsense system as soon as possible to fix this issue.

Original title
Deciso OPNsense diag_backup.php filename Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installati...
Original description
Deciso OPNsense diag_backup.php filename Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Deciso OPNsense. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of backup configuration files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-28131.
nvd CVSS3.0 6.8
Vulnerability type
CWE-78 OS Command Injection
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026