Description
Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).
Published: 2026-04-07
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Tianxin Internet Behavior Management System contains an OS command injection flaw in the Reporter component endpoint. By supplying a crafted objClass parameter that includes shell metacharacters and output redirection, an unauthenticated attacker can execute arbitrary system commands. This allows the attacker to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process, resulting in full control over the affected device. The weakness is a classic command injection issue, identified as CWE‑78.

Affected Systems

The flaw affects Beijing Topsec Network Security Technology Co., Ltd.'s Tianxin Internet Behavior Management System. While specific vulnerable firmware revisions are not listed, all releases prior to NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin are potentially impacted. The Reporter component, which processes the toQuery.php endpoint, is the entry point for exploitation.

Risk and Exploitability

The vulnerability is assessed with a CVSS score of 9.3, indicating critical severity. No EPSS score is available, and the flaw is not currently listed in the CISA KEV catalog. Exploitation is straightforward for an attacker with network access to the device, as it is unauthenticated and driven by simple HTTP requests to the Reporter endpoint. Public exploitation was observed by ShadowServer on June 1 2024, confirming real‑world risk.

Generated by OpenCVE AI on April 7, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the official firmware update NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin.
  • Verify the integrity of the firmware using the provided checksums or digital signatures.
  • Reboot the device to apply the patch and confirm the Reporter endpoint no longer accepts crafted parameters.
  • Monitor logs for attempted command injection attempts.
  • If unable to update immediately, restrict network access to the device and block HTTP requests to the Reporter endpoint to mitigate exposure.

Generated by OpenCVE AI on April 7, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System
Vendors & Products Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).
Title Tianxin Internet Behavior Management System Command Injection via toQuery.php
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Beijing Topsec Network Security Tianxin Internet Behavior Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-08T14:45:21.214Z

Reserved: 2026-01-15T20:57:10.582Z

Link: CVE-2021-4473

cve-icon Vulnrichment

Updated: 2026-04-08T14:45:17.972Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T13:16:44.540

Modified: 2026-04-07T13:20:11.643

Link: CVE-2021-4473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:49:34Z

Weaknesses