CVE-2022-50791
HIGH WAF: High
CVSS 7.8
Published: 2025-12-30
CWE-78
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a conditional command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the vulnerable ping.php script, which triggers the malicious file and then deletes it.
WAF Coverage Analysis
OS Command Injection
High WAF Coverage
OWASP: A03:2021 Injection
932xxx - Remote Code Execution
Affected Software
| Vendor | Product | Version |
|---|---|---|
| sound4 | impact_firmware | 2.15 |
| sound4 | impact_firmware | 1.69 |
| sound4 | pulse_firmware | 2.15 |
| sound4 | pulse_firmware | 1.69 |
| sound4 | first_firmware | 2.15 |
| sound4 | first_firmware | 1.69 |
| sound4 | impact_eco_firmware | 1.16 |
| sound4 | pulse_eco_firmware | 1.16 |
| sound4 | big_voice4_firmware | 1.2 |
| sound4 | big_voice2_firmware | 1.30 |
References
- exchange.xforce.ibmcloud.com (Third Party Advisory)
- packetstormsecurity.com (Exploit, Third Party Advisory, VDB Entry)
- www.sound4.com (Product)
- www.vulncheck.com (Third Party Advisory)
- www.zeroscience.mk (Exploit, Third Party Advisory)