Description
A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.
Published: 2026-05-22
Score: 10 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an Improper Input Validation flaw in UniFi OS devices that allows a malicious actor who has access to the local network to supply crafted input to the device and cause it to execute arbitrary operating‑system commands with device privileges. This flaw permits the device to run commands supplied by an attacker, leading to full compromise of the affected device.

Affected Systems

Affected products include Ubiquiti Inc EFG, Ubiquiti Inc ENVR, Ubiquiti Inc ENVR‑Core, Ubiquiti Inc Express 7, Ubiquiti Inc UCG‑Fiber, Ubiquiti Inc UCG‑Industrial, Ubiquiti Inc UCG‑Max, Ubiquiti Inc UCG‑Ultra, Ubiquiti Inc UCK, Ubiquiti Inc UCK‑Enterprise, Ubiquiti Inc UCKP, Ubiquiti Inc UDM, Ubiquiti Inc UDM‑Beast, Ubiquiti Inc UDM‑Pro, Ubiquiti Inc UDM‑Pro‑Max, Ubiquiti Inc UDM‑SE, Ubiquiti Inc UDR, Ubiquiti Inc UDR‑5G, Ubiquiti Inc UDR7, Ubiquiti Inc UDW, Ubiquiti Inc UNAS‑2, Ubiquiti Inc UNAS‑4, Ubiquiti Inc UNAS‑Pro, Ubiquiti Inc UNAS‑Pro‑4, Ubiquiti Inc UNAS‑Pro‑8, Ubiquiti Inc UNVR, Ubiquiti Inc UNVR‑G2, Ubiquiti Inc UNVR‑G2‑Pro, Ubiquiti Inc UNVR‑Instant, Ubiquiti Inc UNVR‑Pro, and Ubiquiti Inc UniFi OS Server. No specific version information is reported.

Risk and Exploitability

The flaw has a CVSS score of 10, indicating maximum severity. EPSS data are not available and the issue is not listed in the CISA KEV catalog, so the probability of exploitation is unknown. The description indicates that the attacker must have network access to reach the affected input handling code; this is the likely attack vector. Because the flaw allows arbitrary command execution, exploitation would enable an attacker to take complete control of a device if the attacker can reach it.

Generated by OpenCVE AI on May 22, 2026 at 04:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official firmware patch released by Ubiquiti for all affected UniFi OS devices.
  • Restrict management traffic to the devices to a trusted subnet or isolated network segment and disable unused management interfaces.
  • Enforce network segmentation and firewall rules so that only authorized IP ranges can reach the device’s internal management interfaces.

Generated by OpenCVE AI on May 22, 2026 at 04:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title Command Injection Vulnerability in UniFi OS Devices

Fri, 22 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-05-22T00:43:49.096Z

Reserved: 2026-03-31T15:00:06.521Z

Link: CVE-2026-34910

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-22T02:16:34.527

Modified: 2026-05-22T02:16:34.527

Link: CVE-2026-34910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T04:30:25Z

Weaknesses