CVE-2026-36827
Description
A command injection vulnerability exists in Panabit PAP-XM320 up to and including V7.7. The web management interface invokes the backend helper /usr/sbin/pappiw and passes user-controlled parameters to it. The helper performs unsafe argument processing using eval, which allows command injection when attacker-controlled input is included in the arguments. As a result, an authenticated remote attacker with access to the management interface may execute arbitrary shell commands.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Panabit PAP-XM320 up to V7.7 has a command injection in pappiw helper via eval, letting authenticated admins execute arbitrary shell commands.
Vulnerability
A command injection vulnerability exists in the web management interface of Panabit PAP-XM320 up to and including V7.7 [1]. The backend helper /usr/sbin/pappiw is invoked with user-controlled parameters, and it performs unsafe argument processing using eval, which allows arbitrary command injection [1].
Exploitation
An authenticated attacker with access to the management interface can inject shell metacharacters into the parameters passed to pappiw; the helper passes these arguments through eval, enabling arbitrary command execution. No special network position beyond the management interface is required, but valid credentials are necessary [1].
Impact
Successful exploitation allows the attacker to execute arbitrary shell commands on the underlying operating system with the privileges of the vulnerable helper process. This can lead to full compromise of the device's confidentiality, integrity, and availability [1].
Mitigation
Panabit has not yet released a patched version as of the publication date (2026-05-19). The vendor advisory [1] does not describe any workaround. Users should monitor vendor communications and restrict access to the management interface to trusted networks and accounts [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.