Description
A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access.
Published: 2026-01-20
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A command injection flaw in Zoom Node Multimedia Routers (MMRs) allows a meeting participant with network access to execute arbitrary commands on the device. The vulnerability resides in input handling that is not properly sanitized, giving the attacker control over system command execution, which can lead to full compromise of the MMR, including data exfiltration, service disruption, or further attacks against connected infrastructure.

Affected Systems

Zoom Communications Inc. Zoom Node-MMR devices with firmware versions earlier than 5.2.1716.0 are affected. Any deployment that has not been updated to at least this version is vulnerable.

Risk and Exploitability

The flaw is assigned a CVSS score of 9.9, indicating a critical severity. The EPSS score is below 1%, suggesting low current exploitation probability, and the issue is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a network-based attack that a meeting participant can perform after joining the session, exploiting the insufficient input validation to inject malicious commands.

Generated by OpenCVE AI on April 18, 2026 at 15:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the MMR firmware to 5.2.1716.0 or later, which contains the fix for the command injection flaw.
  • If an update is not immediately possible, isolate the MMR from untrusted networks and enforce strict participant role restrictions to minimize exposure.
  • Apply network segmentation and firewall rules to limit traffic to only necessary management interfaces of the MMR.
  • Continuously monitor the MMR logs for anomalous command execution or unexpected system calls to detect potential exploitation attempts.

Generated by OpenCVE AI on April 18, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Zoom
Zoom zoom
Vendors & Products Zoom
Zoom zoom

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
Description A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access.
Title Zoom Node Deployments - Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zoom

Published:

Updated: 2026-01-20T16:45:18.457Z

Reserved: 2026-01-12T12:20:38.435Z

Link: CVE-2026-22844

cve-icon Vulnrichment

Updated: 2026-01-20T16:45:13.453Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T14:16:21.980

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22844

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses