Description
A SUID root-owned binary in /home/xd/terminal/XDTerminal in International Data Casting (IDC) SFX2100 on Linux allows a local actor to potentially preform local privilege escalation depending on conditions of the system via execution of the affected SUID binary. This can be via PATH hijacking, symlink abuse or shared object hijacking.
Published: 2026-03-05
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

A self‑executable binary that runs with root privileges is located in the user "xd" home directory of the SFX2100 satellite receiver, allowing an adversary who can execute code locally to elevate privileges to root. The vulnerability is a classic SUID root weakness that can give the attacker full control of the device and its firmware. Precise exploitation possibilities include arbitrary code execution as root, manipulation of system configuration, or persistence via rogue binaries.

Affected Systems

International Datacasting Corporation’s SFX2100 Satellite Receiver running the SFX2100 firmware is affected. No version information is available. The vulnerability resides in the /home/xd/terminal/XDTerminal binary and relies on system file paths and user‑controlled symlinks or PATH entries, so any machine deploying this firmware with the default directory layout is at risk.

Risk and Exploitability

The base CVSS score of 8.6 indicates a high‑severity flaw. EPSS is reported as less than 1%; thus, while the vulnerability is currently low probability for exploitation, it remains a serious risk because local attackers—such as maintenance staff or an attacker who first compromises the device remotely—could use the SUID binary via PATH hijacking, symlink abuse, or shared object hijacking. The flaw is not listed in CISA’s KEV catalog, but its high CVSS and root escalations warrant immediate attention. The most likely attack vector is a local actor who has read‑write access to the user’s home directory or can alter PATH entries to inject malicious programs that the SUID binary will subsequently execute.

Generated by OpenCVE AI on April 18, 2026 at 09:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the root privilege escalation fix (CWE‑269) by revoking the setuid bit on /home/xd/terminal/XDTerminal using chmod u-s /home/xd/terminal/XDTerminal
  • Eliminate the CWE‑269 vulnerability by removing or carefully managing any writable directory entries in the PATH that point to user home directories, particularly /home/xd
  • Patch the SFX2100 firmware to the vendor’s latest release which corrects the ownership and permissions of the affected binary, thereby addressing the CWE‑269 weakness

Generated by OpenCVE AI on April 18, 2026 at 09:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
Vendors & Products Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared International Datacasting Corporation
International Datacasting Corporation sfx2100 Satellite Receiver
Vendors & Products International Datacasting Corporation
International Datacasting Corporation sfx2100 Satellite Receiver

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description A SUID root-owned binary in /home/xd/terminal/XDTerminal in International Data Casting (IDC) SFX2100 on Linux allows a local actor to potentially preform local privilege escalation depending on conditions of the system via execution of the affected SUID binary. This can be via PATH hijacking, symlink abuse or shared object hijacking.
Title Multiple SUID Root Binaries in `xd` User Home Directory Leading to Potential Local Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


Subscriptions

Datacast Sfx2100 Sfx2100 Firmware
International Datacasting Corporation Sfx2100 Satellite Receiver
cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-05T16:39:49.783Z

Reserved: 2026-03-04T07:53:45.786Z

Link: CVE-2026-29123

cve-icon Vulnrichment

Updated: 2026-03-05T16:39:46.315Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T02:16:51.530

Modified: 2026-03-11T18:35:37.817

Link: CVE-2026-29123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:00:10Z

Weaknesses