Home

Description

A hidden console command is vulnerable to command injection flaw when control characters are passed to its second argument. A third party researcher Eugene Lim had discovered vulnerability in the way console command passes to a popen function call. Attackers with authenticated access to SSH console of Crestron devices may use to run underlying OS commands.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-05 | Updated 2026-05-06 | Assigner Crestron




HIGH: 7.4CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-88 Improper neutralization of argument delimiters in a command ('argument injection')

Product status

Default status
unaffected

3.002.0043.001 (custom)
affected

References

www.crestron.com/...-TSS-770-TSS-1070-TSW-570/3-003-0015-001 patch

www.crestron.com/...sw-xx70_3.003.0015.001_release_notes.pdf release-notes

cve.org (CVE-2026-7865)

nvd.nist.gov (CVE-2026-7865)

Download JSON