Description
A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument template_path can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-03-14: | Advisory disclosed |
| 2026-03-14: | VulDB entry created |
| 2026-03-14: | VulDB entry last update |
Credits
0menc (VulDB User)
VulDB
References
vuldb.com/?id.351077 (VDB-351077 | Topsec TopACM HTTP Request nmc_sync.php os command injection)
vuldb.com/?ctiid.351077 (VDB-351077 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.769768 (Submit #769768 | Topsec Technologies Inc. TopACM V3.0 OS Command Injection)
my.feishu.cn/...FFdhzoeodDxfxeazNcxBzCnRf?from=from_copylink