A hidden console command is vulnerable to command injection
flaw when control characters are passed to its second argument.
A third party researcher Eugene Lim had discovered vulnerability
in the way console command passes to a popen function call. Attackers with
authenticated access to SSH console of Crestron devices may use to run
underlying OS commands.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A hidden console command is vulnerable to command injection flaw when control characters are passed to its second argument. A third party researcher Eugene Lim had discovered vulnerability in the way console command passes to a popen function call. Attackers with authenticated access to SSH console of Crestron devices may use to run underlying OS commands. | |
| Title | Hidden Console Command | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Crestron
Published:
Updated: 2026-05-05T15:05:12.734Z
Reserved: 2026-05-05T13:36:54.938Z
Link: CVE-2026-7865
No data.
Status : Received
Published: 2026-05-05T16:16:19.730
Modified: 2026-05-05T16:16:19.730
Link: CVE-2026-7865
No data.
OpenCVE Enrichment
Updated: 2026-05-05T17:45:06Z