No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. | |
| Title | Endian Firewall /cgi-bin/logs_ids.cgi DATE Perl Command Injection | |
| First Time appeared |
Endian
Endian firewall |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:* cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:* |
|
| Vendors & Products |
Endian
Endian firewall |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-02T18:41:43.303Z
Reserved: 2026-03-30T20:26:18.724Z
Link: CVE-2026-34794
Updated: 2026-04-02T18:41:33.755Z
Status : Received
Published: 2026-04-02T15:16:44.547
Modified: 2026-04-02T15:16:44.547
Link: CVE-2026-34794
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:20:49Z