Back to Home
GeiserX icon

genieacs-mcp

by GeiserX

Overview

Acts as a bridge to expose GenieACS instances as an MCP v1 (JSON-RPC for LLMs) server, enabling read-only data consumption and actions on connected CPEs.

Installation

Run Command
go run ./cmd/server

Environment Variables

  • ACS_URL
  • ACS_USER
  • ACS_PASS

Security Notes

The server has a potential JSON query injection vulnerability in the `client/acs.go` methods (`GetDevice`, `GetFileByName`, `GetTasksForDevice`). User-provided input (e.g., `id`, `fname`) is directly inserted into JSON query strings using `fmt.Sprintf` without proper escaping. If a malicious input contains JSON special characters (e.g., `"`), it could manipulate the underlying GenieACS API query, potentially leading to unintended data access or actions. Additionally, the server uses default `admin:admin` credentials for GenieACS if environment variables are not set, posing a significant security risk if deployed without configuration changes.

Similar Servers

Stats

Interest Score35
Security Score4
Cost ClassMedium
Avg Tokens750
Stars6
Forks0
Last Update2026-01-17

Tags

GenieACSMCPIoTDevice ManagementJSON-RPC