Description
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
Published: 2026-04-02
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution via authenticated access
Action: Apply Patch
AI Analysis

Impact

Authenticated users of Endian Firewall can send a crafted DATE parameter to the /cgi-bin/logs_openvpn.cgi script, causing the script to construct an unvalidated file path that is passed to a Perl open() call, thereby allowing arbitrary OS commands to be executed as the web server user. The resulting command injection can lead to full compromise of the firewall machine, including loss of confidentiality, integrity, and availability of network services managed by the device.

Affected Systems

The vulnerability affects Endian Firewall editions 3.3.25 and all earlier releases, including the community build. Users running version 3.3.25, 2.4, or older 2.1.2 are susceptible. The issue has been identified in the standard enterprise and community installations, meaning all organizations relying on these builds are at risk until a newer release is applied.

Risk and Exploitability

The CVSS base score of 8.7 denotes high severity, and while the EPSS score indicates that exploitation probability is currently low (<1%), the vulnerability requires only authenticated access to the firewall and can be triggered via the web interface, making it exploitable within an internal network or by users with credentials. The vulnerability is not listed in the CISA KEV catalog, which suggests that no widely distributed exploitation has been observed yet, but the impact remains high for impacted systems.

Generated by OpenCVE AI on April 7, 2026 at 20:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Endian Firewall to the latest release that contains the patch for /cgi-bin/logs_openvpn.cgi command injection.
  • If an immediate upgrade is not possible, restrict or remove access to the /cgi-bin/logs_openvpn.cgi endpoint from the web interface or disable the OpenVPN logs feature.
  • Verify that the DATE parameter is properly validated or escape special characters in the CGI script before usage.
  • Monitor the system for anomalous activity and review logs for suspicious command execution attempts.
  • Check Endian’s support site or community forums for any additional mitigations or workarounds.

Generated by OpenCVE AI on April 7, 2026 at 20:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
Title Endian Firewall /cgi-bin/logs_openvpn.cgi DATE Perl Command Injection
First Time appeared Endian
Endian firewall
Weaknesses CWE-78
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-03T13:01:28.234Z

Reserved: 2026-03-30T20:26:18.724Z

Link: CVE-2026-34796

cve-icon Vulnrichment

Updated: 2026-04-03T13:01:25.203Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:45.050

Modified: 2026-04-07T14:37:14.427

Link: CVE-2026-34796

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:56:08Z

Weaknesses