TopVuln

High-risk vulnerability digests

CVE-2026-41036

  • HIGH

Details

CVSS v3
8.7
CVSS v4
8.7
NVD published
2026-04-21 10:16:30
EPSS
0.3% probability · 48.9th percentile — 2026-05-12
Affected versions
All affected Quantum Networks router models
Summary
This vulnerability exists in Quantum Networks routers, caused by insufficient input sanitization in the device's management CLI interface. An authenticated remote attacker can exploit the flaw to inject arbitrary OS commands that execute with root privileges on the affected router. Successful exploitation leads to full compromise of the core network device, allowing attackers to intercept traffic or pivot into the internal network.
Remediation
Organizations using Quantum Networks routers should monitor for an official security patch from the vendor and apply it immediately upon release. Restrict remote management access to the router to only trusted, whitelisted IP addresses. Enforce strong unique passwords for all administrative router accounts to reduce risk of initial compromise.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.