CVE-2026-1222
Published: 20 January 2026
Summary
CVE-2026-1222 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Org (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload directly enables web shell deployment (T1100) on a public-facing controller via remote exploitation (T1190).
NVD Description
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Arbitrary File Upload vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Deeper analysisAI
CVE-2026-1222, published on 2026-01-20, is an Arbitrary File Upload vulnerability (CWE-434) affecting the PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS. Assigned a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), the flaw enables privileged remote attackers to upload and execute web shell backdoors, resulting in arbitrary code execution on the server.
The vulnerability can be exploited by remote attackers who possess high privileges, requiring low attack complexity over the network with no user interaction. Successful exploitation provides high-impact access to confidentiality, integrity, and availability, allowing attackers to achieve full arbitrary code execution and potentially compromise the entire server.
Advisories from TWCERT/CC provide further details on the issue, available at https://www.twcert.org.tw/en/cp-139-10643-2f8d7-2.html and https://www.twcert.org.tw/tw/cp-132-10642-3b808-1.html.
Details
- CWE(s)