CVE-2017-20236
Received Received - Intake
Command Injection in ProSoft ICX35-HWC Gateway Allows Root Access

Publication date: 2026-04-03

Last updated on: 2026-04-22

Assigner: VulnCheck

Description
ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an input validation vulnerability in the web user interface that allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields. Attackers can exploit this vulnerability to gain root privileges and execute arbitrary commands on the device through the accessible web interface.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
prosoft-technology icx35-hwc_firmware to 1.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways have an input validation vulnerability in their web user interface. This flaw allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields on the web interface.

Exploiting this vulnerability enables attackers to gain root privileges and execute arbitrary commands on the affected device.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows remote attackers to gain root access to the device, which means full control over the system.

  • Attackers can execute arbitrary commands on the device.
  • Compromise of device integrity and confidentiality.
  • Potential disruption of services provided by the cellular gateway.
  • Use of the compromised device as a foothold for further attacks within a network.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart