An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into OpenSSL argument fields within requests
sent to the utility route, leading to remote code execution.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json | Third Party Advisory |
| https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-27 01:16
Updated : 2026-03-09 19:56
NVD link : CVE-2026-24695
Mitre link : CVE-2026-24695
CVE.ORG link : CVE-2026-24695
JSON object : View
Products Affected
copeland
- xweb_300d_pro
- xweb_300d_pro_firmware
- xweb_500b_pro_firmware
- xweb_500b_pro
- xweb_500d_pro_firmware
- xweb_500d_pro
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
