Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. | |
| Title | Endian Firewall /cgi-bin/logs_firewall.cgi DATE Perl Command Injection | |
| First Time appeared |
Endian
Endian firewall |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:* cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:* |
|
| Vendors & Products |
Endian
Endian firewall |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-02T16:22:58.843Z
Reserved: 2026-03-30T20:26:18.724Z
Link: CVE-2026-34793
No data.
Status : Received
Published: 2026-04-02T15:16:43.323
Modified: 2026-04-02T15:16:43.323
Link: CVE-2026-34793
No data.
OpenCVE Enrichment
No data.
Weaknesses