Description
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains an authenticated command injection vulnerability in the www-data-handler.php script that allows attackers to inject system commands through the 'services' POST parameter. Attackers can exploit this vulnerability by crafting malicious 'services' parameter values to execute arbitrary system commands with www-data user privileges.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5737.php (Zero Science Lab Disclosure (ZSL-2022-5737))
packetstormsecurity.com/...x-services-Command-Injection.html (Packet Storm Security Exploit Details)
exchange.xforce.ibmcloud.com/vulnerabilities/247917 (IBM X-Force Vulnerability Exchange Entry)
www.sound4.com/ (SOUND4 Product Homepage)
www.vulncheck.com/...mmand-injection-via-www-data-handlerphp (VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Authenticated Command Injection via www-data-handler.php)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.