Description
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.
INFO
Published Date :
2026-02-17T14:29:05.423Z
Last Modified :
2026-03-23T15:44:10.384Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-22208 vulnerability.
| Vendors | Products |
|---|---|
| Opens100 Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-22208.