An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into the Wi-Fi SSID and/or password fields
can lead to remote code execution when the configuration is processed.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json | Third Party Advisory |
| https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-27 02:16
Updated : 2026-02-27 23:06
NVD link : CVE-2026-25196
Mitre link : CVE-2026-25196
CVE.ORG link : CVE-2026-25196
JSON object : View
Products Affected
copeland
- xweb_300d_pro
- xweb_300d_pro_firmware
- xweb_500b_pro_firmware
- xweb_500b_pro
- xweb_500d_pro_firmware
- xweb_500d_pro
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
