CVE-2026-35682
Published: 17 April 2026
Description
Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that enables arbitrary command execution (e.g., starting telnetd), resulting in root‑level access.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by validating filename parameters against malicious payloads like command separators.
Restricts filename inputs to safe characters and formats, blocking injection of arbitrary commands such as telnetd.
Remediates the specific command injection flaw through timely application of vendor patches or workarounds.
Security SummaryAI
CVE-2026-35682 is an authenticated command injection vulnerability in Anviz CX2 Lite, where a filename parameter allows attackers to execute arbitrary commands, such as starting telnetd, resulting in root-level access. This flaw is classified under CWE-77 (Command Injection) and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
An authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network without user interaction. By injecting malicious commands into the filename parameter, they achieve arbitrary command execution with root privileges, enabling full system compromise, including potential persistence, data exfiltration, or further lateral movement.
CISA's ICS Advisory ICSA-26-106-03 details the vulnerability and mitigation recommendations, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-03 and in CSAF JSON format at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-106-03.json. Vendor guidance from Anviz is accessible via https://www.anviz.com/contact-us.html.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables authenticated remote command injection (T1059.004: Unix Shell) leading to root privileges via exploitation (T1068: Exploitation for Privilege Escalation, T1210: Exploitation of Remote Services).