CVE-2026-2008

A vulnerability was detected in abhiphile fermat-mcp up to 47f11def1cd37e45dd060f30cdce346cbdbd6f0a. This vulnerability affects the function eqn_chart of the file fmcp/mpl_mcp/core/eqn_chart.py. Performing a manipulation of the argument equations results in code injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/abhiphile/fermat-mcp/ Product
https://github.com/abhiphile/fermat-mcp/issues/9 Exploit Vendor Advisory
https://github.com/abhiphile/fermat-mcp/issues/9#issue-3837794397 Exploit Vendor Advisory
https://vuldb.com/?ctiid.344590 Permissions Required VDB Entry
https://vuldb.com/?id.344590 Third Party Advisory VDB Entry
https://vuldb.com/?submit.743458 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:abhiphile:fermat:*:*:*:*:*:*:*:*

History

17 Feb 2026, 19:12

Type Values Removed Values Added
CPE cpe:2.3:a:abhiphile:fermat:*:*:*:*:*:*:*:*
First Time Abhiphile
Abhiphile fermat
Summary
  • (es) Se detectó una vulnerabilidad en abhiphile fermat-mcp hasta 47f11def1cd37e45dd060f30cdce346cbdbd6f0a. Esta vulnerabilidad afecta a la función eqn_chart del archivo fmcp/mpl_mcp/core/eqn_chart.py. Realizar una manipulación del argumento equations resulta en inyección de código. Es posible iniciar el ataque de forma remota. El exploit ya es público y puede ser utilizado. Este producto utiliza un rolling release para proporcionar entrega continua. Por lo tanto, no hay detalles de versión disponibles para las versiones afectadas ni actualizadas. El proyecto fue informado del problema con antelación a través de un informe de incidencias, pero aún no ha respondido.
References () https://github.com/abhiphile/fermat-mcp/ - () https://github.com/abhiphile/fermat-mcp/ - Product
References () https://github.com/abhiphile/fermat-mcp/issues/9 - () https://github.com/abhiphile/fermat-mcp/issues/9 - Exploit, Vendor Advisory
References () https://github.com/abhiphile/fermat-mcp/issues/9#issue-3837794397 - () https://github.com/abhiphile/fermat-mcp/issues/9#issue-3837794397 - Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.344590 - () https://vuldb.com/?ctiid.344590 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.344590 - () https://vuldb.com/?id.344590 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.743458 - () https://vuldb.com/?submit.743458 - Third Party Advisory, VDB Entry

06 Feb 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 07:16

Updated : 2026-02-17 19:12


NVD link : CVE-2026-2008

Mitre link : CVE-2026-2008

CVE.ORG link : CVE-2026-2008


JSON object : View

Products Affected

abhiphile

  • fermat
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')