Description
SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endpoint. Attackers can send POST requests with the sysCmd parameter containing shell commands to execute code on the device with router privileges.
Published: 2026-03-11
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The SAPIDO RB‑1732 router firmware version 2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endpoint. The flaw is identified as CWE‑639 in the provided data. An attacker can send a POST request with the sysCmd parameter containing shell commands, causing the device to run those commands with router privileges, potentially giving full control over the system.

Affected Systems

Affected systems are SAPIDO RB‑1732 routers running firmware version 2.0.43. No other versions or product families are listed in the CNA data, so only the specified build is confirmed vulnerable.

Risk and Exploitability

The CVSS score of 9.3 marks this vulnerability as critical. The EPSS score of less than 1% suggests a low probability of exploitation in the near term, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is an unauthenticated HTTP POST to the formSysCmd endpoint; exploitation requires only network reachability to the device. Successful exploitation results in remote code execution with administrative privileges, giving the attacker full control over the device’s operating system.

Generated by OpenCVE AI on March 17, 2026 at 15:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor‑supplied firmware update that removes or disables the formSysCmd functionality.
  • Restrict network access to the formSysCmd endpoint so that only trusted IP ranges can reach it.
  • Disable the formSysCmd functionality if it is not required for your deployment.
  • Monitor network traffic and logs for unexpected POST requests to the formSysCmd endpoint.
  • Verify that the firmware version in use is up to date via the vendor’s official support portal or security advisories.

Generated by OpenCVE AI on March 17, 2026 at 15:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sapido
Sapido rb-1732
Vendors & Products Sapido
Sapido rb-1732

Wed, 11 Mar 2026 22:30:00 +0000


Wed, 11 Mar 2026 22:00:00 +0000


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endpoint. Attackers can send POST requests with the sysCmd parameter containing shell commands to execute code on the device with router privileges.
Title SAPIDO RB-1732 V2.0.43 Remote Command Execution via formSysCmd
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:04:39.043Z

Reserved: 2026-02-23T17:23:37.579Z

Link: CVE-2019-25487

cve-icon Vulnrichment

Updated: 2026-03-11T19:22:28.904Z

cve-icon NVD

Status : Deferred

Published: 2026-03-11T19:16:03.157

Modified: 2026-04-15T14:56:45.970

Link: CVE-2019-25487

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:36Z

Weaknesses