Vulnerability Description
Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Endian | Firewall Community | <= 3.3.25 |
Related Weaknesses (CWE)
References
- https://help.endian.com/hc/en-us/sections/360004371358-CommunityRelease Notes
- https://www.vulncheck.com/advisories/endian-firewall-cgi-bin-logs-ids-cgi-date-pThird Party Advisory
FAQ
What is CVE-2026-34794?
CVE-2026-34794 is a vulnerability with a CVSS score of 8.8 (HIGH). Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a fil...
How severe is CVE-2026-34794?
CVE-2026-34794 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34794?
Check the references section above for vendor advisories and patch information. Affected products include: Endian Firewall Community.