Title: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via traceroute.php Severity: High Date: December 30, 2025 Affected Versions: - IMPACT/Pulse/First Version 2: 1.1/2.15 - IMPACT/Pulse/Eco Version 2: 1.1.16 - BigStep4 1.4 - BigSafe4 1.2 - BigStep2 1.3.4 - BigSafe2 1.3.4 - BigStream 1.2/2.4.29 - VM2 1.11 CVE: CVE-2022-50795 CWE: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CVSS: 8.5 CVSS V4 Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N References: - Zero Science Lab Disclosure (ZSL-2022-5740) - Packet Storm Security Exploit Details - IBM X-Force Vulnerability Exchange Entry - SOUND4 Product Homepage Credit: LiquidWorm as Gjoko Krstic of Zero Science Lab Description: The vulnerability allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the traceroute.php script, which triggers the malicious file and then deletes it after execution.