| Summary | A command injection vulnerability exists in Panabit PAP-XM320 up to and including V7.7. The web management interface invokes the backend helper /usr/sbin/pappiw and passes user-controlled parameters to it. The helper performs unsafe argument processing using eval, which allows command injection when attacker-controlled input is included in the arguments. As a result, an authenticated remote attacker with access to the management interface may execute arbitrary shell commands. |
|---|---|
| Publication Date | May 20, 2026, 2:16 a.m. |
| Registration Date | May 20, 2026, 4:13 a.m. |
| Last Update | May 20, 2026, 3:04 a.m. |