The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
History

Wed, 04 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
Title Authenticated OS Command Injection via Ping Utility Leading to Root RCE
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-04T08:30:31.930Z

Reserved: 2026-03-03T09:59:08.426Z

Link: CVE-2026-28773

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-04T08:16:13.497

Modified: 2026-03-04T08:16:13.497

Link: CVE-2026-28773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.