CVE-2026-0782
Published: 23 January 2026
Description
ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required to exploit this vulnerability. The…
more
specific flaw exists within the web-based user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28291.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the core flaw of insufficient validation of user-supplied strings before system calls by requiring comprehensive input validation at all entry points in the web UI.
Mandates timely remediation of known flaws like this command injection vulnerability through patching or updates to prevent exploitation on affected devices.
Reduces the impact of successful command injection and RCE by enforcing least privilege on the web UI process, limiting privileges available to executed arbitrary code.
Security SummaryAI
CVE-2026-0782 is a command injection vulnerability within the web-based user interface of ALGO 8180 IP Audio Alerter devices, enabling remote code execution. The flaw arises from insufficient validation of user-supplied strings before they are used in system calls, allowing attackers to inject and execute arbitrary commands. This issue affects installations of the ALGO 8180 IP Audio Alerter and is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command).
Remote attackers who possess valid authentication credentials can exploit this vulnerability over the network with low complexity and no user interaction required. Exploitation grants the ability to execute arbitrary code in the context of the device, resulting in high impacts to confidentiality, integrity, and availability. The CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) underscores its severity for authenticated network users.
The Zero Day Initiative advisory (ZDI-26-004), which canonically reported this as ZDI-CAN-28291, provides further details; security practitioners should consult it for recommended mitigations or patches, as published on 2026-01-23.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in web UI enables remote exploitation of the service for arbitrary OS command execution.