CVE-2026-2667
Improper Access Control in Rongzhitong Dispatch API Enables Remote Exploit
Publication date: 2026-02-18
Last updated on: 2026-02-26
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rongzhitong | visual_integrated_command_and_dispatch_platform | to 2026-02-06 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2667 is an access control vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform, specifically in the API endpoint /dispatch/api?cmd=userinfo.
Due to improper or missing access restrictions, unauthorized remote attackers can access this API without any authentication.
This flaw allows attackers to retrieve sensitive information such as organization names and contact numbers.
The vulnerability is classified under CWE-284 (Improper Access Control) and has a moderate severity with a CVSSv3 base score of 5.3.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to sensitive information without requiring any authentication.
Attackers can remotely exploit the flaw to retrieve confidential data such as organization names and contact numbers.
Because the exploit is publicly available, the risk of exploitation is increased.
The impact primarily affects the confidentiality of the system, potentially leading to data leakage.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the vulnerable API endpoint /dispatch/api?cmd=userinfo without authentication and observing if sensitive user information is returned.
A simple detection method is to send an HTTP GET request to the endpoint and check the response for unauthorized access to user information.
- Use curl to test the endpoint: curl -v http://<target-ip-or-domain>/dispatch/api?cmd=userinfo
- Monitor network traffic for unauthorized access attempts to /dispatch/api?cmd=userinfo.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves restricting access to the vulnerable API endpoint to prevent unauthorized remote exploitation.
- Apply restrictive firewall rules to block or limit access to /dispatch/api?cmd=userinfo from untrusted networks.
- Implement proper authentication and access control mechanisms on the API endpoint to ensure only authorized users can access sensitive information.
- Monitor logs and network traffic for suspicious access attempts to the vulnerable endpoint.