Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code

Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code

Posted on January 28, 2026January 28, 2026 By CWS

A important zero‑day vulnerability in Gemini MCP Device exposes customers to distant code execution (RCE) assaults with none authentication.

Tracked as ZDI‑26‑021 / ZDI‑CAN‑27783 and assigned CVE‑2026‑0755, the flaw carries a most CVSS v3.1 rating of 9.8, reflecting its ease of exploitation and extreme affect.

In response to a brand new advisory from Development Micro’s Zero Day Initiative (ZDI), the difficulty impacts the open‑supply gemini-mcp-tool, a utility designed to combine Gemini fashions with Mannequin Context Protocol (MCP) companies.

Vulnerability Overview

Each the seller and product are listed as Gemini MCP Device / gemini-mcp-tool within the advisory. On the core of the vulnerability is the improper dealing with of person‑equipped enter within the execAsync methodology.

This operate passes enter straight right into a system name with out satisfactory validation or sanitization.

A distant attacker can exploit this command injection weak point to execute arbitrary code on the underlying system, working with the privileges of the service account.

FieldInformationCVE IDCVE-2026-07550‑Day Namegemini-mcp-tool execAsync Command Injection RCE VulnerabilityCVSS v3.1 Score9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)Affected Productgemini-mcp-toolImpactRemote, unauthenticated arbitrary code execution

As a result of the assault vector is community‑based mostly and requires no prior authentication or person interplay, web‑uncovered or shared environments are at notably excessive threat.

The vulnerability was initially reported to the seller on July 25, 2025, through a 3rd‑social gathering platform.

ZDI adopted up for updates in November 2025 and, after receiving no enough response, knowledgeable the seller on December 14, 2025 of its intention to publish the case as a zero‑day advisory.

The coordinated public disclosure and advisory replace occurred on January 9, 2026.

On the time of publication, no official patch or replace has been documented. Because of this, mitigation choices are restricted.

ZDI recommends strictly proscribing entry to the Gemini MCP Device by making certain it isn’t straight uncovered to the web and limiting interplay to trusted networks and customers.

Directors also needs to monitor methods working gemini-mcp-tool for suspicious course of execution and strange outbound connections that would point out profitable exploitation.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Arbitrary, Attackers, Code, Execute, Gemini, MCP, Remote, Tool, Vulnerability

Post navigation

Previous Post: Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
Next Post: TP-Link Archer Vulnerability Let Attackers Take Control Over the Router

Related Posts

Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Cyber Security News
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins Cyber Security News
MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules Cyber Security News
Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach Cyber Security News
Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News