CVE-2026-4946

CVE-2026-4946: NSA Ghidra Auto-Analysis Annotation Command Execution

A malicious binary can trigger arbitrary command execution in Ghidra when an analyst clicks on auto-generated comments.

AHA! has discovered an issue with Ghidra from the National Security Agency (NSA), and is publishing this disclosure in accordance with AHA!’s standard disclosure policy today, on March 25, 2026. CVE-2026-4946 has been assigned to this issue, based on the original vulnerability disclosure GHSA-mc3p-mq2p-xw6v and demonstrated at a regular AHA! meeting by the discoverers.

Read more

CVE-2026-1442

CVE-2026-1442: Unitree UPK files Hard-Coded Key

AHA! has discovered an issue with UPK files produced by Unitree, and is publishing this disclosure in accordance with AHA!’s standard disclosure policy today, on Februrary 28, 2026. CVE-2026-1442 has been assigned to this issue, as has GCVE-1337-2025-00000000000000000000000000000000000000000000000001111111111110101111111111000000000000000000000000000000000000000000000000000000101.

This vulnerability is estimated to have a CVSSv31 rating of CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (7.8, High) and the relevant SSVC vectors are Exploitation: PoC and Technical Impact: Total. This issue is an instance of [CWE-321].

Read more

CVE-2025-35028

CVE-2025-35028: HexStrike AI MCP Server Command Injection

AHA! has discovered an issue with HexStrike AI from 0x4m4, and is issuing this disclosure in accordance with AHA!’s standard disclosure policy on November 30, 2025. CVE-2025-35028 has been assigned to this issue. Any questions about this disclosure should be directed to [email protected].

The GCVE identifier for this issue is GCVE-1337-2025-00000000000000000000000000000000000000000000000000111111111111111111111111000000000000000000000000000000000000000000000000000000011

Executive Summary

HexStrike AI is a fairly popular model context protocol (MCP) server, having collected about five thousand stars on GitHub at the time of this disclosure, and has been forked over a thousand times. It is billed as an “AI-Powered MCP Cybersecurity Automation Platform,” and is likely shipping as part of other AI security products.

Read more

CVE-2025-35021

CVE-2025-35021: Abilis CPX Fallback Shell Connection Relay

AHA! has discovered an issue with Abilis CPX devices, and is publishing this disclosure in accordance with runZero’s standard disclosure policy today, November 3, 2025. CVE-2025-35021 has been assigned to this issue. Any questions about this disclosure should be directed to [email protected].

The GCVE identifier for this issue is GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111111111011111111110000000000000000000000000000000000000000000000000000000100

Executive Summary

By failing to authenticate three times to an unconfigured Abilis CPX device via SSH, an attacker can login to a restricted shell on the fourth attempt, and from there, relay connections. This issue is an instance of CWE-1188, ‘Initialization of a Resource with an Insecure Default,’ and is estimated to have a CVSS 3.1 score of 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). The relevant SSVC vectors for this vulnerability are Exploitation: PoC and Technical Impact: Partial.

Read more

CVE-2025-35027

CVE-2025-35027: Unitree Robotics wpa_supplicant_restart.sh Command Injection

AHA! has discovered an issue with the Go2, G1, H1, and B2 series robots (which includes both the quadraped and biped model lines) from Unitree, and is issuing this disclosure in accordance with AHA!’s standard disclosure policy on Friday, September 26, 2025. CVE-2025-35027 has been assigned to this issue.

Any questions about this disclosure should be directed to [email protected].

The GCVE identifier for this issue is GCVE-1337-2025-00000000000000000000000000000000000000000000000001011011111110011111111110000000000000000000000000000000000000000000000000000000010

Read more