Cyber Posture

CVE-2026-0782

High

Published: 23 January 2026

Published
23 January 2026
Modified
13 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0037 59.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required to exploit this vulnerability. The…

more

specific flaw exists within the web-based user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28291.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the core flaw of insufficient validation of user-supplied strings before system calls by requiring comprehensive input validation at all entry points in the web UI.

prevent

Mandates timely remediation of known flaws like this command injection vulnerability through patching or updates to prevent exploitation on affected devices.

prevent

Reduces the impact of successful command injection and RCE by enforcing least privilege on the web UI process, limiting privileges available to executed arbitrary code.

Security SummaryAI

CVE-2026-0782 is a command injection vulnerability within the web-based user interface of ALGO 8180 IP Audio Alerter devices, enabling remote code execution. The flaw arises from insufficient validation of user-supplied strings before they are used in system calls, allowing attackers to inject and execute arbitrary commands. This issue affects installations of the ALGO 8180 IP Audio Alerter and is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command).

Remote attackers who possess valid authentication credentials can exploit this vulnerability over the network with low complexity and no user interaction required. Exploitation grants the ability to execute arbitrary code in the context of the device, resulting in high impacts to confidentiality, integrity, and availability. The CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) underscores its severity for authenticated network users.

The Zero Day Initiative advisory (ZDI-26-004), which canonically reported this as ZDI-CAN-28291, provides further details; security practitioners should consult it for recommended mitigations or patches, as published on 2026-01-23.

Details

CWE(s)

Affected Products

algosolutions
8180 ip audio alerter firmware
5.5

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in web UI enables remote exploitation of the service for arbitrary OS command execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References