Honeywell Control Network Module (CNM) contains command injection vulnerability in the web interface. An attacker could exploit this vulnerability via command delimiters, potentially resulting in Remote Code Execution (RCE).
References
History

Thu, 21 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 May 2026 11:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78

Thu, 21 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description Honeywell Control Network Module (CNM) contains command injection vulnerability in the web interface. An attacker could exploit this vulnerability via command delimiters, potentially resulting in Remote Code Execution (RCE).
Title Improper Sanitization in CNM Web Interface
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Honeywell

Published:

Updated: 2026-05-21T12:38:52.263Z

Reserved: 2026-04-02T16:12:22.574Z

Link: CVE-2026-5433

cve-icon Vulnrichment

Updated: 2026-05-21T12:38:46.162Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-21T09:16:30.270

Modified: 2026-05-21T15:26:35.653

Link: CVE-2026-5433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T11:30:06Z