Description
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5733.php (Zero Science Lab Disclosure (ZSL-2022-5733))
packetstormsecurity.com/....x-dns.php-Command-Injection.html (Packet Storm Security Exploit Details)
exchange.xforce.ibmcloud.com/vulnerabilities/247922 (IBM X-Force Vulnerability Exchange Entry)
www.sound4.com/ (SOUND4 Product Homepage)
www.vulncheck.com/...onditional-command-injection-via-dnsphp (VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via dns.php)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.