Command Injection Vulnerability in Bastillion System Management by bastillion-io
CVE-2026-1064

5.1MEDIUM

Key Information:

Vendor
CVE Published:
17 January 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-1064?

A remote command injection vulnerability was identified in the System Management Module of Bastillion up to version 4.0.1. This flaw resides in the processing logic handled within the SystemKtrl.java file, allowing attackers to execute arbitrary commands on the system. The disclosure of this vulnerability poses a significant risk, as it has been made publicly available and could be exploited by malicious actors. Despite attempts to notify the vendor regarding this security issue, there has been no response, emphasizing the need for users to take immediate action to protect their systems.

Affected Version(s)

Bastillion 4.0.0

Bastillion 4.0.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ana10gy (VulDB User)
.