Description
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by sending malicious input injected into the server username field of the import preconfiguration action in the API V1 route.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- high
- Privileges
- high
- User Action
- none
- Scope
- changed
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-78
Metadata
- Primary Vendor
- COPELAND
- Published
- 2/27/2026
- Last Modified
- 2/27/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
copeland : xweb_300d_pro_firmwarecopeland : xweb_500d_pro_firmwarecopeland : xweb_500b_pro_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.