Home

Description

A command injection vulnerability exists in Panabit PAP-XM320 up to and including V7.7. The web management interface invokes the backend helper /usr/sbin/pappiw and passes user-controlled parameters to it. The helper performs unsafe argument processing using eval, which allows command injection when attacker-controlled input is included in the arguments. As a result, an authenticated remote attacker with access to the management interface may execute arbitrary shell commands.

PUBLISHED Reserved 2026-04-06 | Published 2026-05-19 | Updated 2026-05-19 | Assigner mitre

References

secreu.notion.site/...36827-3652c0ab46158036a888ef4a12b104bf exploit

www.panabit.com/

secreu.notion.site/...36827-3652c0ab46158036a888ef4a12b104bf

cve.org (CVE-2026-36827)

nvd.nist.gov (CVE-2026-36827)

Download JSON