Impact
Perle IOLAN STS and SCS terminal servers running firmware versions earlier than 6.0 are susceptible to OS command injection when an authenticated user issues the 'ps' command over the device’s restricted shell via Telnet or SSH. The shell does not sanitize arguments passed to a system sh -c call that runs as root, allowing an attacker to inject shell metacharacters and execute arbitrary commands with root privileges. This flaw is classified as CWE‑78 (OS Command Injection) and permits a fully compromised underlying operating system when exploited.
Affected Systems
The affected products are Perle IOLAN SCS and IOLAN STS terminal server models whose firmware is prior to version 6.0. The vendor has confirmed that the IOLAN SCG and SCR models do not contain this vulnerable functionality and are therefore not impacted.
Risk and Exploitability
The vulnerability carries a CVSS base score of 8.6, indicating high severity. No EPSS score is provided and the issue is not listed in the CISA KEV catalog, yet the attack requires authenticated access to the restricted shell via Telnet or SSH. Given that the command injection runs with root privileges, the potential impact on confidentiality, integrity, and availability is critical and extends to the entire device.
OpenCVE Enrichment