CVE-2026-34792

high

Description

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

References

https://www.vulncheck.com/advisories/endian-firewall-cgi-bin-logs-clamav-cgi-date-perl-command-injection

https://help.endian.com/hc/en-us/sections/360004371358-Community

Details

Source: Mitre, NVD

Published: 2026-04-02

Updated: 2026-04-02

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High