Impact
An SQL injection flaw exists in the SonicWall SMA1000 series appliances due to improper neutralization of special characters in SQL commands. An attacker who has authenticated with read‑only administrator privileges can exploit this vulnerability to elevate their rights, ultimately gaining primary administrator access. This allows full control over the appliance, including configuration changes, data exfiltration, and further network compromise.
Affected Systems
The affected devices are SonicWall SMA1000 series network security appliances. No specific firmware or software version is listed in the advisory, so all current SMA1000 units should be considered vulnerable until a vendor patch is available.
Risk and Exploitability
The vulnerability is remote and requires only authenticated access with read‑only rights, a privilege level that is usually granted for monitoring purposes. Because the flaw permits privilege escalation to primary administrator, the potential impact is high, giving an attacker full administrative control. No CVSS or EPSS scores are supplied, but the lack of exploit probability data and absence from the KEV catalog suggest that while the vulnerability is serious, the likelihood of widespread exploitation remains uncertain.
OpenCVE Enrichment