[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-5433":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-21T14:01:49.036Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":14,"duplicates":15,"related":16,"reserved_at":9,"published_at":17,"modified_at":17,"state":18,"summary":19,"references_raw":26,"kevs":33,"epss":9,"epss_history":34,"metrics":35,"affected":43},"CVE-2026-5433","Honeywell Control\nNetwork Module (CNM) contains command injection vulnerability\nin the web interface. An attacker could exploit this vulnerability via command\ndelimiters, potentially resulting in Remote Code Execution (RCE).",null,[],[],[],[],[],[],[],"2026-05-21T08:35:31.438Z","Received",{"cisa_kev":20,"cisa_ransomware":20,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":21,"severity_score":22,"severity_version":23,"severity_source":24,"severity_vector":25,"severity_status":18},false,"critical",9.1,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",[27],{"url":28,"sources":29,"tags":31},"https://process.honeywell.com/",[24,30],"nvd",[32],"Patch",[],[],[36,41],{"source":24,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":37,"cvss_v4_0":9},{"baseScore":22,"baseSeverity":38,"vectorString":25,"impactScore":39,"exploitabilityScore":40},"CRITICAL",10,5.9,{"source":30,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":42,"cvss_v4_0":9},{"baseScore":22,"baseSeverity":38,"vectorString":25,"impactScore":39,"exploitabilityScore":40},[44],{"ecosystem":9,"name":45,"vendor":46,"product":47,"cpe_part":48,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":49},"Control Network Module (CNM)","honeywell international inc.","control network module (cnm)","a",[50],{"version":51,"is_range":52,"range_type":24,"version_start":53,"version_start_type":54,"version_end":55,"version_end_type":54,"fixed_in":9},">= 100.1, \u003C= 110.2",true,"100.1","including","110.2"]