Description
A vulnerability was found in Intelbras TIP 635G 1.12.3.5. This vulnerability affects unknown code of the component Ping Handler. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection leading to potential root execution
Action: Assess Impact
AI Analysis

Impact

A flaw in the Ping Handler of Intelbras TIP 635G allows attackers to inject arbitrary operating system commands through manipulated ping requests. The vulnerability is a classic command injection weakness, enabling remote attackers to execute code with the privileges of the device, which could lead to full system compromise.

Affected Systems

The affected product is the Intelbras TIP 635G router running firmware version 1.12.3.5. No other firmware versions are listed as affected in the current advisory.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate overall risk. The EPSS score is under 1%, suggesting low likelihood of widespread exploitation, and the vulnerability is not currently listed in the CISA KEV catalog. The attack vector is inferred to be remote, as the description states that the exploit can be executed from outside the device. No official patch or workaround is available, and the vendor has not responded to early disclosure.

Generated by OpenCVE AI on April 16, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Block external access to the device’s Ping Handler by configuring firewall rules or route ACLs, preventing untrusted networks from triggering the injection.
  • Check the current firmware; if it is 1.12.3.5, await and install any vendor patch as soon as it is released.
  • If no patch is forthcoming, replace the Intelbras TIP 635G with a device that does not expose the vulnerable Ping service or disable the ping functionality entirely.

Generated by OpenCVE AI on April 16, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Intelbras tip 635g
Intelbras tip 635g Firmware
CPEs cpe:2.3:h:intelbras:tip_635g:-:*:*:*:*:*:*:*
cpe:2.3:o:intelbras:tip_635g_firmware:1.12.3.5:*:*:*:*:*:*:*
Vendors & Products Intelbras tip 635g
Intelbras tip 635g Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Intelbras
Intelbras tip635g
Vendors & Products Intelbras
Intelbras tip635g

Tue, 24 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Intelbras TIP 635G 1.12.3.5. This vulnerability affects unknown code of the component Ping Handler. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Intelbras TIP 635G Ping os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Intelbras Tip635g Tip 635g Tip 635g Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T19:02:23.970Z

Reserved: 2026-02-24T09:41:22.792Z

Link: CVE-2026-3101

cve-icon Vulnrichment

Updated: 2026-02-27T19:02:19.106Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T15:21:41.103

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3101

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:30:15Z

Weaknesses