SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated OS command injection vulnerability that allows remote attackers to execute arbitrary shell commands through the 'password' parameter. Attackers can exploit the login.php and index.php scripts by injecting shell commands via the 'password' POST parameter to execute commands with web server privileges.

Project Subscriptions

Vendors Products
Big Voice2 Subscribe
Big Voice2 Firmware Subscribe
Big Voice4 Subscribe
Big Voice4 Firmware Subscribe
First Firmware Subscribe
Impact Eco Subscribe
Impact Eco Firmware Subscribe
Impact Firmware Subscribe
Pulse-eco Subscribe
Pulse Eco Subscribe
Pulse Eco Firmware Subscribe
Pulse Firmware Subscribe
Stream Extension Subscribe
Wm2 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 13 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sound4 big Voice2
Sound4 big Voice2 Firmware
Sound4 big Voice4
Sound4 big Voice4 Firmware
Sound4 first Firmware
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream Extension
Sound4 wm2
Sound4 wm2 Firmware
CPEs cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*
cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*
Vendors & Products Sound4 big Voice2
Sound4 big Voice2 Firmware
Sound4 big Voice4
Sound4 big Voice4 Firmware
Sound4 first Firmware
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream Extension
Sound4 wm2
Sound4 wm2 Firmware

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 first
Sound4 impact
Sound4 pulse-eco
Vendors & Products Sound4
Sound4 first
Sound4 impact
Sound4 pulse-eco

Mon, 22 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated OS command injection vulnerability that allows remote attackers to execute arbitrary shell commands through the 'password' parameter. Attackers can exploit the login.php and index.php scripts by injecting shell commands via the 'password' POST parameter to execute commands with web server privileges.
Title SOUND4 IMPACT/FIRST/PULSE/Eco v2.x Unauthenticated Remote Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-22T22:03:29.168Z

Reserved: 2025-12-19T14:03:57.724Z

Link: CVE-2023-53963

cve-icon Vulnrichment

Updated: 2025-12-22T21:56:19.420Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-22T22:16:00.693

Modified: 2026-01-13T15:42:50.763

Link: CVE-2023-53963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:40:08Z

Weaknesses