← Volver a CVEs
CVE-2022-50789
HIGH7.8
Descripcion
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado12/30/2025
Ultima modificacion1/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
sound4:big_voice2sound4:big_voice2_firmwaresound4:big_voice4sound4:big_voice4_firmwaresound4:firstsound4:first_firmwaresound4:impactsound4:impact_ecosound4:impact_eco_firmwaresound4:impact_firmwaresound4:pulsesound4:pulse_ecosound4:pulse_eco_firmwaresound4:pulse_firmwaresound4:stream_extensionsound4:wm2sound4:wm2_firmware
Debilidades (CWE)
CWE-78
Referencias
https://exchange.xforce.ibmcloud.com/vulnerabilities/247922(disclosure@vulncheck.com)
https://packetstormsecurity.com/files/170260/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-dns.php-Command-Injection.html(disclosure@vulncheck.com)
https://www.sound4.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-dnsphp(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5733.php(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.