← Zuruck zu CVEs
CVE-2022-50789
HIGH7.8
Beschreibung
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht12/30/2025
Zuletzt geandert1/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
sound4:big_voice2sound4:big_voice2_firmwaresound4:big_voice4sound4:big_voice4_firmwaresound4:firstsound4:first_firmwaresound4:impactsound4:impact_ecosound4:impact_eco_firmwaresound4:impact_firmwaresound4:pulsesound4:pulse_ecosound4:pulse_eco_firmwaresound4:pulse_firmwaresound4:stream_extensionsound4:wm2sound4:wm2_firmware
Schwachen (CWE)
CWE-78
Referenzen
https://exchange.xforce.ibmcloud.com/vulnerabilities/247922(disclosure@vulncheck.com)
https://packetstormsecurity.com/files/170260/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-dns.php-Command-Injection.html(disclosure@vulncheck.com)
https://www.sound4.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-dnsphp(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5733.php(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.