CVE-2026-28773

The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite  Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
References
Link Resource
https://www.abdulmhsblog.com/posts/sfx2100-vulns/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-04 08:16

Updated : 2026-03-09 18:23


NVD link : CVE-2026-28773

Mitre link : CVE-2026-28773

CVE.ORG link : CVE-2026-28773


JSON object : View

Products Affected

datacast

  • sfx2100_firmware
  • sfx2100
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')