SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file. | |
| Title | SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via dns.php | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-30T22:41:36.629Z
Reserved: 2025-12-26T16:41:38.889Z
Link: CVE-2022-50789
No data.
Status : Received
Published: 2025-12-30T23:15:45.557
Modified: 2025-12-30T23:15:45.557
Link: CVE-2022-50789
No data.
OpenCVE Enrichment
No data.