CVE-2026-3943
Awaiting Analysis Awaiting Analysis - Queue
Command Injection in H3C ACG1000-AK230 Remote WebUI Endpoint

Publication date: 2026-03-11

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in H3C ACG1000-AK230 up to 20260227. This affects an unknown part of the file /webui/?aaa_portal_auth_local_submit. The manipulation of the argument suffix results in command injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor is investigating and remediating this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-11
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
h3c acg1000-ak230 to 20260227 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-3943 is a critical pre-authentication command injection vulnerability in the H3C ACG1000-AK230 gateway device. It occurs because the application fails to properly filter or escape user-supplied input in the "suffix" argument of the "/webui/?aaa_portal_auth_local_submit" endpoint. This allows an attacker to inject malicious commands that are executed on the server without any authentication.'}, {'type': 'paragraph', 'content': 'Attackers can exploit this flaw by sending specially crafted requests containing command injection payloads, enabling them to execute arbitrary operating system commands remotely. This can lead to full control over the affected server.'}] [1, 2, 3]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'Exploitation of this vulnerability can have severe impacts including theft or modification of sensitive data such as database credentials and configuration files.'}, {'type': 'paragraph', 'content': 'An attacker gaining control over the server can use it as a "zombie" machine or for cryptocurrency mining. Additionally, the vulnerability enables lateral movement within the internal network, potentially disrupting the entire corporate infrastructure.'}, {'type': 'paragraph', 'content': 'These impacts can cause significant financial loss, reputational damage, and disruption of business continuity.'}] [1, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by sending specially crafted HTTP GET requests to the vulnerable endpoint and observing the system's response or side effects."}, {'type': 'paragraph', 'content': 'For example, a proof-of-concept command involves sending a GET request to the endpoint /webui/?aaa_portal_auth_local_submit with the parameter suffix containing a command injection payload.'}, {'type': 'paragraph', 'content': 'A sample detection command using curl might be:'}, {'type': 'list_item', 'content': 'curl -v "http://<target-ip>/webui/?g=aaa_portal_auth_local_submit&bkg_flag=0&suffix=%60ls+%3E/usr/local/webui/cyzz.txt%60"'}, {'type': 'paragraph', 'content': "This command attempts to execute the 'ls' command on the server and write the output to a file, which can be checked to confirm vulnerability."}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing strict input validation to allow only expected characters and reject special characters such as backticks, semicolons, and pipes.

Avoid directly concatenating user input into system commands; instead, use safe APIs or prepared statements.

Run the web service under a non-administrative account to limit the potential damage if exploited.

Due to the lack of vendor response and available fixes, consider replacing the affected product with an alternative solution.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart