CVE-2026-3101
Published: 24 February 2026
Description
A vulnerability was found in Intelbras TIP 635G 1.12.3.5. This vulnerability affects unknown code of the component Ping Handler. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could…
more
be used. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
Directly validates and sanitizes inputs to the Ping Handler component to prevent OS command injection exploitation.
Ensures timely identification, reporting, and remediation of the known OS command injection flaw in Intelbras TIP 635G version 1.12.3.5.
Enforces least privilege for low-privileged authenticated users accessing the Ping Handler, limiting potential RCE impact post-exploitation.
Security SummaryAI
CVE-2026-3101 is an OS command injection vulnerability (CWE-77, CWE-78) in the Ping Handler component of Intelbras TIP 635G version 1.12.3.5. The issue allows manipulation of unknown code within this component, enabling remote attackers to inject and execute operating system commands. Assigned a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), it was published on 2026-02-24.
The vulnerability requires low privileges (PR:L), meaning an authenticated user with basic access can exploit it over the network without user interaction. Successful exploitation leads to OS command injection, potentially resulting in root remote code execution (RCE), as detailed in a public writeup. A proof-of-concept exploit has been disclosed publicly.
Advisories from VulDB indicate the vendor was contacted early for coordinated disclosure but provided no response, with no patches or official mitigations mentioned. References include VulDB entries (ctiid.347527, id.347527, submit.757986) and a Notion page detailing the authenticated OS command injection to root RCE.
The exploit's public availability increases the risk of widespread abuse, though no confirmed real-world exploitation has been reported in the provided details.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in remote Ping Handler enables exploitation of public-facing application (T1190), Unix shell command execution (T1059.004), and privilege escalation from low privileges to root RCE (T1068).