The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
References
| Link | Resource |
|---|---|
| https://www.abdulmhsblog.com/posts/sfx2100-vulns/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-04 08:16
Updated : 2026-03-09 18:23
NVD link : CVE-2026-28773
Mitre link : CVE-2026-28773
CVE.ORG link : CVE-2026-28773
JSON object : View
Products Affected
datacast
- sfx2100_firmware
- sfx2100
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
