Description
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated command injection vulnerability in the username parameter. Attackers can exploit index.php and login.php scripts by injecting arbitrary shell commands through the HTTP POST 'username' parameter to execute system commands.
Published: 2025-12-30
Score: 9.3 Critical
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Sound4 big Voice2
Sound4 big Voice2 Firmware
Sound4 big Voice4
Sound4 big Voice4 Firmware
Sound4 first Firmware
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream Extension
Sound4 wm2
Sound4 wm2 Firmware
CPEs cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*
Vendors & Products Sound4 big Voice2
Sound4 big Voice2 Firmware
Sound4 big Voice4
Sound4 big Voice4 Firmware
Sound4 first Firmware
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream Extension
Sound4 wm2
Sound4 wm2 Firmware

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 bigvoice2
Sound4 bigvoice4
Sound4 first
Sound4 impact
Sound4 pulse-eco
Sound4 stream
Vendors & Products Sound4
Sound4 bigvoice2
Sound4 bigvoice4
Sound4 first
Sound4 impact
Sound4 pulse-eco
Sound4 stream

Tue, 30 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an unauthenticated command injection vulnerability in the username parameter. Attackers can exploit index.php and login.php scripts by injecting arbitrary shell commands through the HTTP POST 'username' parameter to execute system commands.
Title SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Unauthenticated Command Injection via Username
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Sound4 Big Voice2 Big Voice2 Firmware Big Voice4 Big Voice4 Firmware Bigvoice2 Bigvoice4 First First Firmware Impact Impact Eco Impact Eco Firmware Impact Firmware Pulse Pulse-eco Pulse Eco Pulse Eco Firmware Pulse Firmware Stream Stream Extension Wm2 Wm2 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-05T20:19:28.739Z

Reserved: 2025-12-26T16:41:38.890Z

Link: CVE-2022-50794

cve-icon Vulnrichment

Updated: 2026-01-05T20:19:04.003Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-30T23:15:46.410

Modified: 2026-01-13T14:34:19.790

Link: CVE-2022-50794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:19:36Z

Weaknesses