Description
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device.
Published: 2026-02-24
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Binardat 10G08‑0800GSM network switches have a command injection flaw in the traceroute diagnostic function of the web management interface. By inserting the special character %1a into the hostname field, an attacker who has authenticated access can execute arbitrary command‑line instructions on the device. This grants the attacker full control over the switch, jeopardizing confidentiality, integrity, and availability. The vulnerability is classified as CWE‑78.

Affected Systems

The flaw affects Binardat Ltd.’s 10G08‑0800GSM network switch, firmware version V300SP10260209 and all earlier releases. The exposed component is the traceroute diagnostic operation in the switch’s web interface.

Risk and Exploitability

With a CVSS score of 8.7 the flaw is considered high severity. The EPSS score is below 1 %, indicating a low likelihood of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to be authenticated to the web interface, so credential compromise or social engineering is a prerequisite. Once that is achieved, the injection is straightforward and can lead to unrestricted remote code execution.

Generated by OpenCVE AI on April 16, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the switch firmware to a version that fixes the command injection issue.
  • Restrict access to the web management interface to a narrow set of trusted administrative hosts.
  • Disable the traceroute diagnostic function if it cannot be updated promptly, or enforce input validation to block injection patterns.
  • Implement network segmentation and monitor for unusual command execution on the device.

Generated by OpenCVE AI on April 16, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware
CPEs cpe:2.3:h:binardat:10g08-0800gsm:-:*:*:*:*:*:*:*
cpe:2.3:o:binardat:10g08-0800gsm_firmware:*:*:*:*:*:*:*:*
Vendors & Products Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Binardat
Binardat 10g08-0800gsm Network Switch
Vendors & Products Binardat
Binardat 10g08-0800gsm Network Switch

Tue, 24 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device.
Title Binardat 10G08-0800GSM Network Switch Traceroute CLI Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Binardat 10g08-0800gsm 10g08-0800gsm Firmware 10g08-0800gsm Network Switch
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-27T18:59:45.204Z

Reserved: 2026-01-14T17:13:44.903Z

Link: CVE-2026-23678

cve-icon Vulnrichment

Updated: 2026-02-27T18:59:39.914Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T16:24:08.090

Modified: 2026-02-25T17:12:08.403

Link: CVE-2026-23678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:30:15Z

Weaknesses