Impact
An OS command injection flaw exists in Copeland XWEB Pro firmware versions 1.12.1 and earlier. The flaw allows an authenticated user to inject arbitrary shell commands through the username and password fields of the restore API v1 route, leading to remote code execution on the device. The weakness is a classic command injection due to lack of proper input sanitization (CWE‑78).
Affected Systems
Copeland XWEB 300D PRO, Copeland XWEB 500B PRO, and Copeland XWEB 500D PRO devices running XWEB Pro firmware version 1.12.1 or earlier are impacted.
Risk and Exploitability
The vulnerability carries a high CVSS score of 8.0, indicating considerable severity. EPSS analysis shows a very low exploitation probability (<1%). The flaw is not listed in the CISA KEV catalog. An attacker must gain authenticated access to the device and then use the API V1 restore endpoint to supply malicious input; successful exploitation results in execution of arbitrary commands on the underlying operating system.
OpenCVE Enrichment