CVE-2022-50791
Command Injection in SOUND4 ping.php Allows Remote Code Execution
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sound4 | pulse | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a conditional command injection in SOUND4 IMPACT/FIRST/PULSE/Eco versions up to 2.x. It allows local authenticated users to create malicious files in the /tmp directory. Additionally, unauthenticated attackers can execute commands by sending a single HTTP POST request to the vulnerable ping.php script, which triggers the malicious file and then deletes it.
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution by unauthenticated attackers and local file manipulation by authenticated users. This can result in full compromise of the affected system, including confidentiality, integrity, and availability impacts.