CVE-2014-6278

HIGH KEV

GNU Bash <4.3 - RCE

Title source: llm

Description

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

Exploits (10)

metasploit WORKING POC
by Stephane Chazelas, wvu, lcamtuf · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
metasploit WORKING POC EXCELLENT
by Stephane Chazelas, wvu, juan vazquez, s module to get native sessions · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_mod_cgi_bash_env_exec.rb
exploitdb WORKING POC
by thatchriseckert · pythonremotehardware
https://www.exploit-db.com/exploits/39568
exploitdb WORKING POC
by lastc0de · textwebappscgi
https://www.exploit-db.com/exploits/39887
exploitdb WORKING POC VERIFIED
by Federico Galatolo · pythonremotelinux
https://www.exploit-db.com/exploits/34900
metasploit WORKING POC EXCELLENT
by Stephane Chazelas, lcamtuf, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/cups_bash_env_exec.rb
vulncheck_xdb WORKING POC
remote
https://github.com/threat9/routersploit
vulncheck_xdb WRITEUP
remote
https://github.com/veeeveeeveee/tabijibiyori-wgetCloud-al5tVPOHMdTt9x2d
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/36933
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34860

References (111)

... and 91 more

Scores

CVSS v3 8.8
EPSS 0.9011
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-10-02
VulnCheck KEV 2018-03-01
ENISA EUVD EUVD-2014-6163

Classification

CWE
CWE-78
Status draft

Affected Products (28)

gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
gnu/bash
... and 13 more

Timeline

Published Sep 30, 2014
KEV Added Oct 02, 2025
Tracked Since Feb 18, 2026