Generated remediation guidance and an executive summary. No account required.
systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retry (lines 440-441) calls `getWifiNetworkListIw(iface)` with the **original unsanitized** `iface` value, which is passed directly to `execSync('iwlist ${iface} scan')`. Any application passing user-controlled input to `si.wifiNetworks()` is vulnerable to arbitrary command execution with the privileges of the Node.js process. Version 5.30.8 fixes the issue.
Use CWE-78, Systeminformation vendor hub and Systeminformation product page to widen CVE-2026-26280 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-21315, CVE-2023-42810 and CVE-2021-21388 for nearby disclosures in the same product family.