Vulnerability Description
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the Wi-Fi SSID and/or password fields can lead to remote code execution when the configuration is processed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Copeland | Xweb 300D Pro Firmware | <= 1.12.1 |
| Copeland | Xweb 300D Pro | - |
| Copeland | Xweb 500D Pro Firmware | <= 1.12.1 |
| Copeland | Xweb 500D Pro | - |
| Copeland | Xweb 500B Pro Firmware | <= 1.12.1 |
| Copeland | Xweb 500B Pro | - |
Related Weaknesses (CWE)
References
- https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-05Third Party Advisory
- https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdateProduct
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2026-25196?
CVE-2026-25196 is a vulnerability with a CVSS score of 8.0 (HIGH). An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input int...
How severe is CVE-2026-25196?
CVE-2026-25196 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25196?
Check the references section above for vendor advisories and patch information. Affected products include: Copeland Xweb 300D Pro Firmware, Copeland Xweb 300D Pro, Copeland Xweb 500D Pro Firmware, Copeland Xweb 500D Pro, Copeland Xweb 500B Pro Firmware.