Description
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated OS command injection vulnerability that allows remote attackers to execute arbitrary shell commands through the 'password' parameter. Attackers can exploit the login.php and index.php scripts by injecting shell commands via the 'password' POST parameter to execute commands with web server privileges.
Published: 2025-12-22
Score: 9.3 Critical
EPSS: 2.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sound4 big Voice2
Sound4 big Voice2 Firmware
Sound4 big Voice4
Sound4 big Voice4 Firmware
Sound4 first Firmware
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream Extension
Sound4 wm2
Sound4 wm2 Firmware
CPEs cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*
Vendors & Products Sound4 big Voice2
Sound4 big Voice2 Firmware
Sound4 big Voice4
Sound4 big Voice4 Firmware
Sound4 first Firmware
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream Extension
Sound4 wm2
Sound4 wm2 Firmware

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 first
Sound4 impact
Sound4 pulse-eco
Vendors & Products Sound4
Sound4 first
Sound4 impact
Sound4 pulse-eco

Mon, 22 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated OS command injection vulnerability that allows remote attackers to execute arbitrary shell commands through the 'password' parameter. Attackers can exploit the login.php and index.php scripts by injecting shell commands via the 'password' POST parameter to execute commands with web server privileges.
Title SOUND4 IMPACT/FIRST/PULSE/Eco v2.x Unauthenticated Remote Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Sound4 Big Voice2 Big Voice2 Firmware Big Voice4 Big Voice4 Firmware First First Firmware Impact Impact Eco Impact Eco Firmware Impact Firmware Pulse Pulse-eco Pulse Eco Pulse Eco Firmware Pulse Firmware Stream Extension Wm2 Wm2 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-22T22:03:29.168Z

Reserved: 2025-12-19T14:03:57.724Z

Link: CVE-2023-53963

cve-icon Vulnrichment

Updated: 2025-12-22T21:56:19.420Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-22T22:16:00.693

Modified: 2026-01-13T15:42:50.763

Link: CVE-2023-53963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:40:08Z

Weaknesses