Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27174— MajorDoMo Unauthenticated Remote Code Execution via Admin Console Eval

CVSS 9.8 · Critical EPSS 85.41% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27174

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
MajorDoMo Unauthenticated Remote Code Execution via Admin Console Eval
Source: NVD (National Vulnerability Database)
Vulnerability Description
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
MajorDoMo 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MajorDoMo是MajorDoMo社区的一个开源DIY智能家居自动化平台。 MajorDoMo存在代码注入漏洞,该漏洞源于modules/panel.class.php中的包含顺序错误导致执行在缺少exit语句的redirect()调用后继续,允许未经验证的请求到达inc_panel_ajax.php中的ajax处理程序,该处理程序将来自GET参数的用户输入直接传递给eval(),可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
sergejeyMajorDoMo 0 ~ * -

II. Public POCs for CVE-2026-27174

#POC DescriptionSource LinkShenlong Link
1MajorDoMo contains a remote code execution caused by an include order bug and lack of exit after redirect in admin panel's PHP console, letting unauthenticated attackers execute arbitrary PHP code via crafted GET requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-27174.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27174

登录查看更多情报信息。

Same Patch Batch · sergejey · 2026-02-18 · 8 CVEs total

CVE-2026-271809.8 CRITICALMajorDoMo Supply Chain Remote Code Execution via Update URL Poisoning
CVE-2026-271759.8 CRITICALMajorDoMo Command Injection in rc/index.php via Race Condition
CVE-2026-271798.2 HIGHMajorDoMo Unauthenticated SQL Injection in Commands Module
CVE-2026-271817.5 HIGHMajorDoMo Unauthenticated Module Uninstall via Market Endpoint
CVE-2026-271777.2 HIGHMajorDoMo Stored Cross-Site Scripting via Property Set Endpoint
CVE-2026-271787.2 HIGHMajorDoMo Stored Cross-Site Scripting via Method Parameters to Shoutbox
CVE-2026-271766.1 MEDIUMMajorDoMo Reflected Cross-Site Scripting in command.php

IV. Related Vulnerabilities

V. Comments for CVE-2026-27174

No comments yet


Leave a comment