Home

Description

SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endpoint. Attackers can send POST requests with the sysCmd parameter containing shell commands to execute code on the device with router privileges.

PUBLISHED Reserved 2026-02-23 | Published 2026-03-11 | Updated 2026-03-11 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

2.0.43
affected

Credits

k1nm3n.aotoi finder

References

www.exploit-db.com/exploits/47031 (ExploitDB-47031) exploit

www.vulncheck.com/...remote-command-execution-via-formsyscmd (VulnCheck Advisory: SAPIDO RB-1732 V2.0.43 Remote Command Execution via formSysCmd) third-party-advisory

cve.org (CVE-2019-25487)

nvd.nist.gov (CVE-2019-25487)

Download JSON