Impact
The flaw is an OS command‑level injection triggered by unsanitized input to the xajaxargs parameter in the execute_DataObjectProc function of the Vaelsys V4 Web interface. This allows an attacker to inject arbitrary operating‑system commands, leading to full remote code execution and compromising confidentiality, integrity, and availability of the affected system. The weakness is formally identified as CWE‑77 and CWE‑78.
Affected Systems
Vaelsys V4 web platform, versions up to 5.1.0 and 5.4.0 are vulnerable. The affected component is the vgrid_server.php file in the /grid directory of the web interface.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity vulnerability. The EPSS score of 1% shows a moderate probability of exploitation; the exploit code is publicly available, so the risk is heightened. It is not included in CISA’s KEV catalog. The likely attack vector is remote over the network: an attacker can send a request to the vulnerable endpoint from outside the trusted network.
OpenCVE Enrichment
EUVD