Description
A vulnerability has been found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. The impacted element is an unknown function of the file /dispatch/api?cmd=userinfo. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Insecure access control leading to potential unauthorized user data disclosure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to manipulate the /dispatch/api?cmd=userinfo endpoint in Rongzhitong Visual Integrated Command and Dispatch Platform. This manipulation bypasses the intended access controls and permits retrieval of user information that should be restricted. The flaw is an improper authorization failure, aligning with CWE‑266 and CWE‑284. As a result, a remote attacker could obtain sensitive user data and potentially use it for further exploitation.

Affected Systems

Affected vendor: Rongzhitong. Product: Visual Integrated Command and Dispatch Platform. Versions up to and including 20260206 are impacted. No other versions are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity vulnerability. The EPSS score of less than 1% suggests that exploitation is unlikely at present. The issue is not on the CISA KEV list, meaning no widespread exploitation has been reported. The attack can be launched remotely via the exposed API, but no additional prerequisites are mentioned beyond the ability to send crafted requests. Maintaining the public disclosure nature of the exploit increases the risk of future attacks.

Generated by OpenCVE AI on April 17, 2026 at 18:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑released patch or upgrade to a version later than 20260206 that resolves the access‑control issue.
  • Restrict the /dispatch/api?cmd=userinfo endpoint to authenticated users by configuring the web server or application firewall to enforce proper authorization.
  • If a patch is not immediately available, temporarily block or remove unauthenticated access to the endpoint and monitor for any attempts to exploit the flaw.

Generated by OpenCVE AI on April 17, 2026 at 18:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rongzhitong:visual_integrated_command_and_dispatch_platform:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Rongzhitong
Rongzhitong visual Integrated Command And Dispatch Platform
Vendors & Products Rongzhitong
Rongzhitong visual Integrated Command And Dispatch Platform

Wed, 18 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. The impacted element is an unknown function of the file /dispatch/api?cmd=userinfo. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Rongzhitong Visual Integrated Command and Dispatch Platform api access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Rongzhitong Visual Integrated Command And Dispatch Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T16:18:58.903Z

Reserved: 2026-02-18T09:10:10.081Z

Link: CVE-2026-2667

cve-icon Vulnrichment

Updated: 2026-02-26T16:18:53.543Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T21:16:25.240

Modified: 2026-02-26T20:32:18.510

Link: CVE-2026-2667

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:45:25Z

Weaknesses