Conditional Command Injection in SOUND4 IMPACT/FIRST/PULSE/Eco Products
CVE-2022-50795
Key Information:
- Vendor
Sound4 Ltd.
- Vendor
- CVE Published:
- 30 December 2025
Badges
What is CVE-2022-50795?
The SOUND4 IMPACT/FIRST/PULSE/Eco products version 2.x and below have a vulnerability that allows local authenticated users to exploit a conditional command injection. By leveraging this flaw, attackers can create malicious files in the /tmp directory. Additionally, unauthenticated users can execute commands remotely by sending a specially crafted HTTP POST request to the traceroute.php script. This request triggers the execution of the malicious file, which is then deleted post-execution, potentially allowing malicious actions without detection.
Affected Version(s)
BigVoice2 1.30
BigVoice4 1.2
Impact/Pulse Eco 1.16
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
