A command injection vulnerability exists in Panabit PAP-XM320 up to and including V7.7. The web management interface invokes the backend helper /usr/sbin/pappiw and passes user-controlled parameters to it. The helper performs unsafe argument processing using eval, which allows command injection when attacker-controlled input is included in the arguments. As a result, an authenticated remote attacker with access to the management interface may execute arbitrary shell commands.
History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Panabit
Panabit pap-xm320
Vendors & Products Panabit
Panabit pap-xm320

Tue, 19 May 2026 21:15:00 +0000

Type Values Removed Values Added
Title Command Injection in Panabit PAP‑XM320 Web Interface Allows Remote Authenticated Attacker to Execute Arbitrary Shell Commands

Tue, 19 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 18:15:00 +0000

Type Values Removed Values Added
Title Command Injection in Panabit PAP‑XM320 Web Interface Allows Remote Authenticated Attacker to Execute Arbitrary Shell Commands
Weaknesses CWE-78

Tue, 19 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability exists in Panabit PAP-XM320 up to and including V7.7. The web management interface invokes the backend helper /usr/sbin/pappiw and passes user-controlled parameters to it. The helper performs unsafe argument processing using eval, which allows command injection when attacker-controlled input is included in the arguments. As a result, an authenticated remote attacker with access to the management interface may execute arbitrary shell commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-05-19T00:00:00.000Z

Updated: 2026-05-19T18:35:09.285Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-36827

cve-icon Vulnrichment

Updated: 2026-05-19T18:35:03.277Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T17:16:21.937

Modified: 2026-05-19T19:16:50.047

Link: CVE-2026-36827

cve-icon Redhat

No data.