Description
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains an SQL injection vulnerability in the 'username' POST parameter of index.php that allows attackers to manipulate database queries. Attackers can inject arbitrary SQL code through the username parameter to bypass authentication and potentially access unauthorized database information.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5727.php (Zero Science Lab Disclosure (ZSL-2022-5727))
packetstormsecurity.com/...o-2.x-username-SQL-Injection.html (Packet Storm Security Exploit Details)
exchange.xforce.ibmcloud.com/vulnerabilities/247947 (IBM X-Force Vulnerability Exchange Entry)
www.sound4.com/ (SOUND4 Product Homepage)
www.vulncheck.com/...-x-sql-injection-via-username-parameter (VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x SQL Injection via Username Parameter)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.