Description
ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an input validation vulnerability in the web user interface that allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields. Attackers can exploit this vulnerability to gain root privileges and execute arbitrary commands on the device through the accessible web interface.
Published: 2026-04-03
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution with root privilege escalation
Action: Immediate Patch
AI Analysis

Impact

This flaw allows a remote attacker to input malicious data into the web interface of ProSoft ICX35‑HWC gateways, causing the device to execute arbitrary system commands. The weakness arises from insufficient input validation and is classified as a command injection vulnerability (CWE‑78). The ability to run system commands grants the attacker full control over the gateway, potentially compromising the confidentiality, integrity, and availability of the device and any networks it serves.

Affected Systems

The vulnerability affects ProSoft Technology ICX35‑HWC Cellular Gateways that run firmware version 1.3 or earlier. Any gateway deployed with these firmware releases is susceptible and could allow an attacker to exploit the unvalidated web input.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity. Although specific exploit probability data is not available, the flaw can be triggered remotely via the web interface without authentication, implying a high risk of exploitation. The vulnerability is not documented as actively exploited, but the severity and easy attack path warrant serious attention.

Generated by OpenCVE AI on April 4, 2026 at 02:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to the latest release that removes the input validation flaw
  • Confirm that the installed firmware is newer than version 1.3
  • If a newer firmware release is unavailable, disable the web interface or limit its access to trusted IPs via rules
  • Continuously monitor device logs for unusual command execution attempts and enforce network segmentation to contain potential breaches

Generated by OpenCVE AI on April 4, 2026 at 02:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Prosoft-technology icx35-hwc Firmware
CPEs cpe:2.3:h:prosoft-technology:icx35-hwc:-:*:*:*:*:*:*:*
cpe:2.3:o:prosoft-technology:icx35-hwc_firmware:*:*:*:*:*:*:*:*
Vendors & Products Prosoft-technology icx35-hwc Firmware

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Prosoft-technology
Prosoft-technology icx35-hwc
Vendors & Products Prosoft-technology
Prosoft-technology icx35-hwc

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an input validation vulnerability in the web user interface that allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields. Attackers can exploit this vulnerability to gain root privileges and execute arbitrary commands on the device through the accessible web interface.
Title ProSoft Technology ICX35-HWC Command Injection via Web Interface
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Prosoft-technology Icx35-hwc Icx35-hwc Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T18:02:55.640Z

Reserved: 2026-04-03T19:07:31.394Z

Link: CVE-2017-20236

cve-icon Vulnrichment

Updated: 2026-04-06T18:00:37.225Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T23:17:00.447

Modified: 2026-04-22T15:12:31.160

Link: CVE-2017-20236

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:21:26Z

Weaknesses