Home

Description

SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.

PUBLISHED Reserved 2025-12-26 | Published 2025-12-30 | Updated 2025-12-30 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Version 2: 1.1/2.15
affected

1.16
affected

1.2
affected

1.30
affected

1.1/2.4.29
affected

1.11
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5733.php (Zero Science Lab Disclosure (ZSL-2022-5733)) third-party-advisory

packetstormsecurity.com/....x-dns.php-Command-Injection.html (Packet Storm Security Exploit Details) exploit

exchange.xforce.ibmcloud.com/vulnerabilities/247922 (IBM X-Force Vulnerability Exchange Entry) vdb-entry

www.sound4.com/ (SOUND4 Product Homepage) product

www.vulncheck.com/...onditional-command-injection-via-dnsphp (VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via dns.php) third-party-advisory

cve.org (CVE-2022-50789)

nvd.nist.gov (CVE-2022-50789)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.