Cyber Posture

CVE-2026-0785

High

Published: 23 January 2026

Published
23 January 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0074 73.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

ALGO 8180 IP Audio Alerter API Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required to exploit this vulnerability. The specific…

more

flaw exists within the API interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28294.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the lack of input validation by requiring checks on user-supplied strings before using them in system calls to prevent command injection.

prevent

Requires timely identification, reporting, and remediation of flaws such as this command injection vulnerability through firmware patching.

prevent

Limits damage from successful RCE by enforcing least privilege on the API process or device context.

Security SummaryAI

CVE-2026-0785 is a command injection vulnerability leading to remote code execution in the API interface of ALGO 8180 IP Audio Alerter devices. The flaw stems from insufficient validation of user-supplied strings before they are used in system calls, enabling attackers to inject and execute arbitrary commands. Affected installations include those running vulnerable firmware versions of the ALGO 8180, as reported under ZDI-CAN-28294, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-78 (Improper Neutralization of Special Elements used in an OS Command).

Remote attackers with valid authentication credentials (low privileges required) can exploit this vulnerability over the network with low complexity and no user interaction. By supplying a malicious string via the API, an attacker can execute arbitrary code in the context of the device, potentially achieving high confidentiality, integrity, and availability impacts, such as full device compromise.

The Zero Day Initiative advisory (ZDI-26-007) at https://www.zerodayinitiative.com/advisories/ZDI-26-007/ details the vulnerability, including proof-of-concept information originally canonized as ZDI-CAN-28294.

Details

CWE(s)

Affected Products

algosolutions
8180 ip audio alerter firmware
5.5

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection vulnerability in remote API interface enables exploitation of public-facing application (T1190) or remote services (T1210) for remote code execution via Unix Shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References