CVE-2026-4620
Received
Received - Intake
OS Command Injection in NEC Aterm Series Enables Remote Execution
Publication date: 2026-03-27
Last updated on: 2026-04-20
Assigner: NEC Corporation
Description
Description
OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to execute arbitrary OS commands via network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nec | aterm_wx3600hp_firmware | to 1.5.3 (exc) |
| nec | aterm_wx1500hp_firmware | to 1.4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an OS Command Injection issue found in NEC Platforms, Ltd. Aterm Series devices. It allows an attacker to execute arbitrary operating system commands remotely via the network.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can run arbitrary OS commands on the affected device, potentially leading to unauthorized control, data compromise, disruption of services, or further attacks within the network.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70