CVE-2026-35682
Received Received - Intake
Authenticated Command Injection in Anviz CX2 Lite Grants Root Access

Publication date: 2026-04-17

Last updated on: 2026-05-04

Assigner: ICS-CERT

Description
Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that enables arbitrary command execution (e.g., starting telnetd), resulting in root‑level access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-17
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-04-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anviz cx2_lite_firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in Anviz CX2 Lite involves an authenticated command injection through a filename parameter. This flaw allows an attacker with valid credentials to execute arbitrary commands on the device, such as starting the telnet daemon (telnetd). Exploiting this vulnerability results in gaining root-level access to the system.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows an attacker with authentication to execute arbitrary commands with root privileges. This could lead to full control over the affected device, unauthorized access to sensitive data, disruption of device functionality, and potential use of the device as a foothold for further attacks within a network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart