TG8 Firewall contains a pre-authentication remote code execution vulnerability in the runphpcmd.php endpoint. The syscmd POST parameter is passed directly to a system command without validation and executed with root privileges. A remote, unauthenticated attacker can supply crafted values to execute arbitrary operating system commands as root, resulting in full device compromise.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 14 Nov 2025 23:00:00 +0000

Type Values Removed Values Added
Description TG8 Firewall contains a pre-authentication remote code execution vulnerability in the runphpcmd.php endpoint. The syscmd POST parameter is passed directly to a system command without validation and executed with root privileges. A remote, unauthenticated attacker can supply crafted values to execute arbitrary operating system commands as root, resulting in full device compromise.
Title TG8 Firewall Unauthenticated RCE via runphpcmd.php
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-14T22:50:45.716Z

Reserved: 2025-11-14T20:52:09.108Z

Link: CVE-2021-4470

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-14T23:15:43.087

Modified: 2025-11-14T23:15:43.087

Link: CVE-2021-4470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.