Description
The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite  Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
Published: 2026-03-04
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution with root privileges
Action: Patch Immediately
AI Analysis

Impact

The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in the International Datacasting Corporation SFX Series SuperFlex Satellite Receiver Web Management Interface of version 101 is vulnerable to OS Command Injection. Insecure parsing of the IPaddr parameter allows an authenticated attacker to bypass server‑side semicolon exclusion checks by using alternate shell metacharacters such as the pipe operator, enabling the execution of arbitrary shell commands with root privileges. This flaw gives a qualified attacker full control over the device, threatening confidentiality, integrity, and availability.

Affected Systems

Affected systems are the International Datacasting Corporation SFX Series SuperFlex Satellite Receiver Web Management Interface, specifically version 101. The vulnerability resides in the Ping diagnostic utility of the SFX2100 model, as identified by the corresponding hardware and firmware CPE entries.

Risk and Exploitability

The flaw carries a CVSS base score of 9.3, indicating critical severity, and a very low EPSS probability (<1%), suggesting that widespread exploitation is unlikely at present. It is not listed in the CISA KEV catalogue. The attack requires authenticated access to the web interface, making it a local or network‑limited threat that can be mitigated by restricting privileged access. Nevertheless, the high severity and root‑level command execution ability make immediate attention essential.

Generated by OpenCVE AI on April 16, 2026 at 13:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest vendor firmware or patch that corrects the insecure parsing logic in the Ping utility.
  • Restrict or disable access to the web management interface from untrusted networks, enforcing strong authentication for authorized users.
  • Implement input validation or sanitize user‑supplied parameters to block shell metacharacters, or disable the Ping diagnostic feature entirely.
  • Monitor device logs for anomalous command execution attempts to detect potential exploitation.

Generated by OpenCVE AI on April 16, 2026 at 13:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
CPEs cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
Vendors & Products Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 05 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
References

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellitereceiver Web Management Interface
Vendors & Products International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellitereceiver Web Management Interface

Wed, 04 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges. The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite  Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
Title Authenticated OS Command Injection via Ping Utility Leading to Root RCE Authenticated OS Command Injection via Ping Utility Leading to RCE as Root

Wed, 04 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
Title Authenticated OS Command Injection via Ping Utility Leading to Root RCE
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


Subscriptions

Datacast Sfx2100 Sfx2100 Firmware
International Datacasting Corporation (idc) Sfx Series Superflex Satellitereceiver Web Management Interface
cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-05T06:00:17.350Z

Reserved: 2026-03-03T09:59:08.426Z

Link: CVE-2026-28773

cve-icon Vulnrichment

Updated: 2026-03-04T19:46:43.474Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T08:16:13.497

Modified: 2026-03-09T18:23:56.230

Link: CVE-2026-28773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:45:21Z

Weaknesses