CVE-2026-28774
Published: 04 March 2026
Description
An OS Command Injection vulnerability exists in the web-based Traceroute diagnostic utility of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. An authenticated attacker can inject arbitrary shell metacharacters (such as the pipe `|` operator)…
more
into the flags parameter, leading to the execution of arbitrary operating system commands with root privileges.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by validating and sanitizing the flags parameter in the Traceroute utility before processing.
Remediates the specific command injection flaw through timely identification, testing, and correction of vulnerabilities like CVE-2026-28774.
Mitigates damage from successful injection by enforcing least privilege, preventing web interface processes from executing commands as root.
Security SummaryAI
CVE-2026-28774 is an OS Command Injection vulnerability (CWE-78) in the web-based Traceroute diagnostic utility of the International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. Published on 2026-03-04, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and potential for significant impacts on confidentiality, integrity, and availability.
An authenticated attacker with low privileges (PR:L) can exploit the vulnerability by injecting arbitrary shell metacharacters, such as the pipe `|` operator, into the flags parameter of the Traceroute utility. Successful exploitation enables the execution of arbitrary operating system commands with root privileges, allowing full control over the affected device.
Mitigation details are available in the referenced advisory at https://www.abdulmhsblog.com/posts/sfx2100-vulns/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in network-accessible web management interface (AV:N/PR:L) enables remote exploitation for arbitrary root command execution via Unix shell metacharacters, directly facilitating T1190 (public-facing app exploit), T1068 (priv esc via vuln), and T1059.004 (Unix shell execution).