CVE-2026-7785: Wireshark-MCP OS Command Injection Hits High Severity
The National Vulnerability Database has disclosed CVE-2026-7785, a high-severity OS command injection vulnerability in the A-G-U-P-T-A wireshark-mcp project (specific commit edaf604416fbc94a201b4043092d4a1b09a12275/400c3da70074f22f3cce7ccb65304cafc7089c89). This flaw resides in the quick_capture function within pyshark_mcp.py, allowing remote attackers to execute arbitrary operating system commands.
The CVSSv3.1 score of 7.3 (HIGH) underscores the significant risk, with the attack vector being network-based and requiring no privileges or user interaction. The National Vulnerability Database also notes that an exploit has been publicly released, drastically increasing the immediate threat. Compounding the issue, the project operates on a rolling release model, meaning no specific affected or patched versions are listed, making tracking remediation challenging.
Critically, the project maintainers were notified of this issue but have yet to respond. This lack of communication and patching in the face of a public exploit and remote command injection capability is a red flag. Defenders should assume this vulnerability is actively being targeted and take immediate steps to mitigate the risk.
What This Means For You
- If your organization utilizes A-G-U-P-T-A wireshark-mcp, you are exposed to remote OS command injection via CVE-2026-7785. Given the public exploit and lack of vendor response, you must immediately identify all instances of this software. Isolate or remove it from production environments until a patch or workaround is available. Do not wait for an official fix; this is a critical, actively exploitable vulnerability.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7785: Wireshark-MCP OS Command Injection via quick_capture
title: CVE-2026-7785: Wireshark-MCP OS Command Injection via quick_capture
id: scw-2026-05-05-ai-1
status: experimental
level: critical
description: |
Detects the execution of the quick_capture function within pyshark_mcp.py by a python interpreter, which is the vulnerable component in CVE-2026-7785. This indicates a potential OS command injection attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-05
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7785/
tags:
- attack.execution
- attack.t1059.004
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'python.exe'
CommandLine|contains:
- 'pyshark_mcp.py'
- 'quick_capture'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7785 | Command Injection | A-G-U-P-T-A wireshark-mcp edaf604416fbc94a201b4043092d4a1b09a12275/400c3da70074f22f3cce7ccb65304cafc7089c89 |
| CVE-2026-7785 | Command Injection | Vulnerable function: quick_capture in pyshark_mcp.py |
| CVE-2026-7785 | Command Injection | Attack vector: Remote |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 05, 2026 at 03:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.