Description
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
Published: 2026-04-02
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Endian Firewall services include a CGI script /cgi-bin/logs_log.cgi that processes a DATE parameter. In versions 3.3.25 and earlier the script builds a file path from the supplied value and passes it directly to a Perl open() call. The regular expression used to validate the parameter does not fully escape shell metacharacters, permitting an attacker to inject arbitrary shell commands. An affected user who authenticates to the firewall can therefore execute any OS command on the underlying host. This type of injection maps to CWE-78 and results in complete loss of confidentiality, integrity and availability of the affected system.

Affected Systems

Any installation of Endian Firewall from version 2.1.2 through 3.3.25 is affected. The vulnerability is present in the endorsed CPE entries for these releases, and all earlier releases that match the same product line are also vulnerable because the same CGI script and validation logic are unchanged. Administrators should therefore verify their current firmware version and compare it to the listed releases.

Risk and Exploitability

The CVSS v3 base score of 8.7 indicates a high impact with a medium privileged threat complexity, reflecting the requirement for local or web‑based authenticated access. Although the EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, the exploitability remains high because the script is part of the web interface and a valid credential grants access. Once authenticated, the attacker can trigger arbitrary OS command execution, making the risk level significant for any organization running these firmware versions.

Generated by OpenCVE AI on April 2, 2026 at 16:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Endian Firewall to the latest supported version that contains the fix for the DATE parameter validation.
  • If an immediate upgrade is not possible, restrict management interface access to trusted network segments and enforce strong authentication.
  • Consider disabling the /cgi-bin/logs_log.cgi service or removing file‑logging functionality via firewall configuration.
  • Monitor for abnormal system calls or failed login attempts to detect potential exploitation.

Generated by OpenCVE AI on April 2, 2026 at 16:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
Title Endian Firewall /cgi-bin/logs_log.cgi DATE Perl Command Injection
First Time appeared Endian
Endian firewall
Weaknesses CWE-78
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-03T03:55:39.696Z

Reserved: 2026-03-30T20:26:18.724Z

Link: CVE-2026-34795

cve-icon Vulnrichment

Updated: 2026-04-02T15:25:04.069Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T15:16:44.800

Modified: 2026-04-03T16:10:52.680

Link: CVE-2026-34795

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:20:48Z

Weaknesses