A hidden console command is vulnerable to command injection flaw when control characters are passed to its second argument.  A third party researcher Eugene Lim had discovered vulnerability in the way console command passes to a popen function call. Attackers with authenticated access to SSH console of Crestron devices may use to run underlying OS commands.
History

Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description A hidden console command is vulnerable to command injection flaw when control characters are passed to its second argument.  A third party researcher Eugene Lim had discovered vulnerability in the way console command passes to a popen function call. Attackers with authenticated access to SSH console of Crestron devices may use to run underlying OS commands.
Title Hidden Console Command
Weaknesses CWE-88
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Crestron

Published: 2026-05-05T15:05:12.734Z

Updated: 2026-05-05T15:05:12.734Z

Reserved: 2026-05-05T13:36:54.938Z

Link: CVE-2026-7865

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T16:16:19.730

Modified: 2026-05-05T16:16:19.730

Link: CVE-2026-7865

cve-icon Redhat

No data.