CVE-2026-30352: Critical RCE in leonvanzyl autocoder /devserver/start Endpoint
The National Vulnerability Database has issued an alert for CVE-2026-30352, a critical remote code execution (RCE) vulnerability impacting leonvanzyl autocoder commit 79d02a. This flaw, rated 9.8 CVSS, resides in the /devserver/start endpoint and permits unauthenticated attackers to execute arbitrary code by supplying a maliciously crafted command parameter. This is a direct command injection, a classic and highly effective attack vector.
This vulnerability exposes systems running the affected autocoder commit to complete compromise. An attacker needs no prior authentication or complex chain of exploits; direct network access to the vulnerable endpoint is sufficient. The National Vulnerability Database confirms the broad impact, categorizing it as network-exploitable with high confidentiality, integrity, and availability impacts. Organizations utilizing this specific commit of autocoder must recognize the immediate and severe threat.
From an attacker’s perspective, this is a low-effort, high-reward target. The ability to execute arbitrary commands remotely on an exposed server is the holy grail for initial access. Defenders need to assume compromise if this service is running unpatched and exposed, especially in development or staging environments that often have laxer controls but still contain sensitive data or access to production resources.
What This Means For You
- If your organization uses leonvanzyl autocoder, specifically commit 79d02a, check immediately for the presence of the `/devserver/start` endpoint. Assume this is a critical exposure. Implement network segmentation to restrict access to this service, and patch or remove the affected commit without delay. Audit logs for any suspicious activity related to the autocoder service.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-30352: RCE via /devserver/start endpoint command injection
title: CVE-2026-30352: RCE via /devserver/start endpoint command injection
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects exploitation attempts against CVE-2026-30352 by looking for requests to the '/devserver/start' endpoint with a 'command=' parameter containing shell metacharacters like '&&', indicating an attempt to inject and execute arbitrary commands.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-30352/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/devserver/start'
cs-method|exact:
- 'GET'
cs-uri-query|contains:
- 'command='
selection_command_injection:
cs-uri-query|contains:
- '&&'
condition: selection AND selection_command_injection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-30352 | RCE | leonvanzyl autocoder commit 79d02a |
| CVE-2026-30352 | RCE | Vulnerable endpoint: /devserver/start |
| CVE-2026-30352 | RCE | Attack vector: crafted command parameter |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 19:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.