CVE-2015-5699
Description
The Switch Configuration Tools Backend (clcmd_server) in Cumulus Linux 2.5.3 and earlier allows local users to execute arbitrary commands via shell metacharacters in a cl-rctl command label.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A local command injection in Cumulus Linux's clcmd_server allows users to execute arbitrary commands as root.
Vulnerability
A command injection vulnerability exists in the Switch Configuration Tools Backend (clcmd_server) of Cumulus Linux 2.5.3 and earlier. The server, when processing commands that end in user-supplied labels, stops validating the input against its whitelist (known as the Rosetta) once it reaches the label portion. The entire label string, including shell metacharacters, is then passed to the shell for execution. This allows an attacker to append arbitrary commands that are executed with the privileges of the server, which runs as root [1].
Exploitation
An attacker must have local access to the system. The command injection relies on supplying a specially crafted label that terminates the intended command and introduces a new one. The injected command must be enclosed in single quotes and cannot contain spaces, as clcmd_server uses spaces to delimit command arguments. To bypass the space limitation, an attacker can write a script in a directory such as their home directory and call that script from the injected command [1].
Impact
Successful exploitation results in arbitrary command execution with root privileges. This constitutes a local privilege escalation, allowing an unprivileged user to gain full control of the system [1].
Mitigation
Cumulus Linux 2.5.3 and earlier are affected. No later version was identified in the references as containing a fix. Users should upgrade to a patched version of Cumulus Linux if available, or restrict local access to trusted users. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog as of the report date [1].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.5.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- seclists.org/fulldisclosure/2015/Aug/23nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.