Description
A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network.

Affected Products:
UniFi Play PowerAmp (Version 1.0.35 and earlier)

UniFi Play Audio Port  (Version 1.0.24 and earlier)


Mitigation:
Update UniFi Play PowerAmp to Version 1.0.38 or later

Update UniFi Play Audio Port  to Version 1.1.9 or later
Published: 2026-04-13
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A series of improper input validation vulnerabilities in Ubiquiti Inc’s UniFi Play devices allow a malicious actor to perform command injection. This flaw can lead to remote code execution, compromising the device and potentially the entire network. The weakness is categorized as CWE‑20, indicating unsafe handling of external input.

Affected Systems

Affected products are the UniFi Play PowerAmp running version 1.0.35 or earlier, and the UniFi Play Audio Port running version 1.0.24 or earlier. These devices are used to manage audio output and power amplification in networked environments.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating a severe impact if exploited. The EPSS score is unavailable and the vulnerability is not listed in CISA's KEV catalog, but the high severity suggests that it may be actively targeted. Based on the description, the likely attack vector is an actor with access to the UniFi Play network, implying that an internal attacker or someone who has compromised a downstream device could exploit the flaw. Successful exploitation would grant privileged control over the underlying operating system, enabling lateral movement, privilege escalation, and potential compromise of the connected network.

Generated by OpenCVE AI on April 13, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update UniFi Play PowerAmp to version 1.0.38 or later
  • Update UniFi Play Audio Port to version 1.1.9 or later

Generated by OpenCVE AI on April 13, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Command Injection via Improper Input Validation in Ubiquiti UniFi Play Devices

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Ubiquiti
Ubiquiti unifi Play Audio Port
Ubiquiti unifi Play Poweramp
Vendors & Products Ubiquiti
Ubiquiti unifi Play Audio Port
Ubiquiti unifi Play Poweramp

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network. Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
 UniFi Play Audio Port  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
 Update UniFi Play Audio Port  to Version 1.1.9 or later
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Ubiquiti Unifi Play Audio Port Unifi Play Poweramp
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-04-14T13:14:19.586Z

Reserved: 2026-01-07T15:39:03.440Z

Link: CVE-2026-22563

cve-icon Vulnrichment

Updated: 2026-04-14T13:09:31.094Z

cve-icon NVD

Status : Received

Published: 2026-04-13T22:16:28.050

Modified: 2026-04-13T22:16:28.050

Link: CVE-2026-22563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:00Z

Weaknesses