Impact
The vulnerability is an unauthenticated command injection exposed by the /cgi-bin/rdfs.cgi endpoint. An attacker can supply an unsanitized Client parameter that is executed by the web server process, enabling arbitrary command execution as the web server user. The weakness corresponds to CWE-306 and CWE-78. The impact is the compromise of confidentiality, integrity, and availability of the affected device, as well as potential pivoting to internal systems if higher privileges are later obtained.
Affected Systems
Barco’s WePresent WiPG‑1000 medical presentation system with firmware versions prior to 2.2.3.0 are affected. The vulnerability exists in the undocumented /cgi-bin/rdfs.cgi endpoint of the device’s web interface.
Risk and Exploitability
The CVSS score of 9.3 indicates critical severity, while an EPSS score of 73% shows a high probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only a crafted HTTP request to the /cgi-bin/rdfs.cgi endpoint and no authentication, allowing an attacker to run arbitrary commands immediately. The likely attack vector is remote HTTP access to the device’s web interface from an untrusted network.
OpenCVE Enrichment
EUVD