← Voltar para CVEs
CVE-2022-50789
HIGH7.8
Descricao
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado12/30/2025
Ultima modificacao1/16/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
sound4:big_voice2sound4:big_voice2_firmwaresound4:big_voice4sound4:big_voice4_firmwaresound4:firstsound4:first_firmwaresound4:impactsound4:impact_ecosound4:impact_eco_firmwaresound4:impact_firmwaresound4:pulsesound4:pulse_ecosound4:pulse_eco_firmwaresound4:pulse_firmwaresound4:stream_extensionsound4:wm2sound4:wm2_firmware
Fraquezas (CWE)
CWE-78
Referencias
https://exchange.xforce.ibmcloud.com/vulnerabilities/247922(disclosure@vulncheck.com)
https://packetstormsecurity.com/files/170260/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-dns.php-Command-Injection.html(disclosure@vulncheck.com)
https://www.sound4.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-dnsphp(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5733.php(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.