Description
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a conditional command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the traceroute.php script, which triggers the malicious file and then deletes it after execution.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5740.php (Zero Science Lab Disclosure (ZSL-2022-5740))
packetstormsecurity.com/...onditional-Command-Injection.html (Packet Storm Security Exploit Details)
exchange.xforce.ibmcloud.com/vulnerabilities/247950 (IBM X-Force Vulnerability Exchange Entry)
www.sound4.com/ (SOUND4 Product Homepage)
www.vulncheck.com/...nal-command-injection-via-traceroutephp (VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via traceroute.php)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.