Description
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the request body sent to the contacts import route.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- high
- Privileges
- high
- User Action
- none
- Scope
- changed
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-78
Metadata
- Primary Vendor
- COPELAND
- Published
- 2/27/2026
- Last Modified
- 2/27/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
copeland : xweb_300d_pro_firmwarecopeland : xweb_500d_pro_firmwarecopeland : xweb_500b_pro_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.