Impact
The vulnerability allows an authenticated user to inject and execute arbitrary shell commands through the unsafe use of the grep parameter in the logs.py module. The code improperly sanitizes the input in one instance while passing it directly to the shell in another, enabling executable payloads. Based on the description, it is inferred that successful exploitation would allow attackers to read, modify, or delete data, or install persistent backdoors.
Affected Systems
Robust infrastructure components managed by Roxy‑WI, a web interface for HAProxy, Nginx, Apache, and Keepalived. Versions up to (but not including) 8.2.8.2 are affected; the issue is resolved in 8.2.8.2 and later releases.
Risk and Exploitability
The vulnerability scores a CVSS of 7.5, indicating a high impact on confidentiality, integrity, and availability. The EPSS is reported as less than 1 %, showing a low exploitation probability in the current environment, and the weakness is not listed in the CISA KEV catalog. Attack requires legitimate authentication to the web interface, after which the attacker can supply a crafted grep argument to execute any system command. No additional conditions are required beyond standard access controls.
OpenCVE Enrichment