Cyber Posture

CVE-2026-0783

HighRCE

Published: 23 January 2026

Published
23 January 2026
Modified
13 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0037 59.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0783 is a high-severity OS Command Injection (CWE-78) vulnerability in Algosolutions 8180 Ip Audio Alerter Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the lack of proper validation of user-supplied strings in the web UI before executing system calls, preventing command injection.

prevent

Requires timely identification, reporting, and correction of the command injection flaw via vendor patches, eliminating the vulnerability.

prevent

Enforces least privilege for the web UI process, limiting the scope and impact of arbitrary code execution even if injection succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability is a command injection (CWE-78) in a web-based UI enabling RCE, directly facilitating T1190 (exploit public-facing web app), T1210 (exploitation of remote service), and T1059.004 (Unix shell command execution via injected strings to system calls).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is required to exploit this vulnerability. The…

more

specific flaw exists within the web-based user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-28292.

Deeper analysisAI

CVE-2026-0783 is a command injection vulnerability in the web-based user interface of ALGO 8180 IP Audio Alerter devices, enabling remote code execution. The flaw stems from insufficient validation of user-supplied strings before they are passed to system calls, allowing attackers to inject and execute arbitrary commands. Affected systems are installations of the ALGO 8180 IP Audio Alerter, with the vulnerability tracked as ZDI-CAN-28292 and assigned a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-78 (Improper Neutralization of Special Elements used in an OS Command).

An authenticated remote attacker with low privileges (PR:L) can exploit this vulnerability over the network with no user interaction required. By supplying a malicious string via the web UI, the attacker achieves remote code execution in the context of the device, potentially granting high confidentiality, integrity, and availability impacts, such as full device compromise.

The Zero Day Initiative has published details in advisory ZDI-26-005, available at https://www.zerodayinitiative.com/advisories/ZDI-26-005/. Security practitioners should consult this advisory for recommended mitigations, such as applying vendor patches if available or restricting authenticated access to the web UI.

Details

CWE(s)

Affected Products

algosolutions
8180 ip audio alerter firmware
5.5

CVEs Like This One

CVE-2026-0785Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0784Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0780Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0796Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0787Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0782Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0786Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0781Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0795Same product: Algosolutions 8180 Ip Audio Alerter
CVE-2026-0779Same product: Algosolutions 8180 Ip Audio Alerter

References