Vulnerability Description
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Endian | Firewall Community | <= 3.3.25 |
Related Weaknesses (CWE)
References
- https://help.endian.com/hc/en-us/sections/360004371358-CommunityRelease Notes
- https://www.vulncheck.com/advisories/endian-firewall-cgi-bin-logs-proxy-cgi-dateThird Party Advisory
FAQ
What is CVE-2026-34791?
CVE-2026-34791 is a vulnerability with a CVSS score of 8.8 (HIGH). Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a f...
How severe is CVE-2026-34791?
CVE-2026-34791 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34791?
Check the references section above for vendor advisories and patch information. Affected products include: Endian Firewall Community.