An OS Command Injection vulnerability exists in the web-based Traceroute diagnostic utility of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. An authenticated attacker can inject arbitrary shell metacharacters (such as the pipe `|` operator) into the flags parameter, leading to the execution of arbitrary operating system commands with root privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellitereceiver Web Management Interface
Vendors & Products International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellitereceiver Web Management Interface

Wed, 04 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description An OS Command Injection vulnerability exists in the web-based Traceroute diagnostic utility of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. An authenticated attacker can inject arbitrary shell metacharacters (such as the pipe `|` operator) into the flags parameter, leading to the execution of arbitrary operating system commands with root privileges.
Title Authenticated OS Command Injection via Traceroute Utility leads to Root RCE
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-04T19:43:58.843Z

Reserved: 2026-03-03T09:59:08.426Z

Link: CVE-2026-28774

cve-icon Vulnrichment

Updated: 2026-03-04T19:43:43.908Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T08:16:13.650

Modified: 2026-03-04T18:08:05.730

Link: CVE-2026-28774

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-04T21:04:00Z

Weaknesses