An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
providing malicious input via the device hostname configuration which
is later processed during system setup, resulting in remote code
execution.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json | Third Party Advisory |
| https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-27 02:16
Updated : 2026-02-27 23:11
NVD link : CVE-2026-20764
Mitre link : CVE-2026-20764
CVE.ORG link : CVE-2026-20764
JSON object : View
Products Affected
copeland
- xweb_300d_pro
- xweb_300d_pro_firmware
- xweb_500b_pro_firmware
- xweb_500b_pro
- xweb_500d_pro_firmware
- xweb_500d_pro
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
