Perle IOLAN STS/SCS terminal server models with firmware versions prior to 6.0 allow authenticated OS command injection via the restricted shell accessed over Telnet or SSH. The shell 'ps' command does not perform proper argument sanitization and passes user-supplied parameters into an 'sh -c' invocation running as root. An authenticated attacker who can log in to the device can inject shell metacharacters after the 'ps' subcommand to execute arbitrary OS commands with root privileges, leading to full compromise of the underlying operating system.
Advisories

No advisories yet.

Fixes

Solution

The vendor has stated that the IOLAN SCG and SCR models do not contain this vulnerable functionality.


Workaround

No workaround given by the vendor.

History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description Perle IOLAN STS/SCS terminal server models with firmware versions prior to 6.0 allow authenticated OS command injection via the restricted shell accessed over Telnet or SSH. The shell 'ps' command does not perform proper argument sanitization and passes user-supplied parameters into an 'sh -c' invocation running as root. An authenticated attacker who can log in to the device can inject shell metacharacters after the 'ps' subcommand to execute arbitrary OS commands with root privileges, leading to full compromise of the underlying operating system.
Title Perle IOLAN STS/SCS Authenticated Command Injection via 'shell ps'
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-17T16:09:08.925Z

Reserved: 2026-01-15T18:42:20.938Z

Link: CVE-2026-23759

cve-icon Vulnrichment

Updated: 2026-03-17T16:09:05.704Z

cve-icon NVD

Status : Received

Published: 2026-03-17T16:16:20.127

Modified: 2026-03-17T16:16:20.127

Link: CVE-2026-23759

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses