Impact
An OS command injection flaw exists in Copeland XWEB Pro versions 1.12.1 and earlier. The vulnerability allows an authenticated attacker to inject arbitrary shell commands by tampering with OpenSSL argument fields in requests sent to the utility route. Successful exploitation results in remote code execution on the device, compromising confidentiality, integrity, and availability of the affected system.
Affected Systems
The flaw affects Copeland XWEB 300D PRO, XWEB 500B PRO, and XWEB 500D PRO models. Any installation running XWEB Pro firmware 1.12.1 or earlier is vulnerable; newer firmware releases contain the fix.
Risk and Exploitability
The CVSS score is 8.0, indicating a high severity. EPSS is reported as less than 1%, implying a very low current exploitation probability, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector requires a valid user login and network connectivity to the device. Once authenticated, the attacker can submit crafted requests to the utility route, triggering remote command execution. Due to the high severity and potential for complete system compromise, prompt remediation is essential.
OpenCVE Enrichment