Cyber Posture

CVE-2026-28774

HighPublic PoCRCE

Published: 04 March 2026

Published
04 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 45.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28774 is a high-severity OS Command Injection (CWE-78) vulnerability in Datacast Sfx2100 Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by validating and sanitizing the flags parameter in the Traceroute utility before processing.

prevent

Remediates the specific command injection flaw through timely identification, testing, and correction of vulnerabilities like CVE-2026-28774.

prevent

Mitigates damage from successful injection by enforcing least privilege, preventing web interface processes from executing commands as root.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection in network-accessible web management interface (AV:N/PR:L) enables remote exploitation for arbitrary root command execution via Unix shell metacharacters, directly facilitating T1190 (public-facing app exploit), T1068 (priv esc via vuln), and T1059.004 (Unix shell execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An OS Command Injection vulnerability exists in the web-based Traceroute diagnostic utility of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. An authenticated attacker can inject arbitrary shell metacharacters (such as the pipe `|` operator)…

more

into the flags parameter, leading to the execution of arbitrary operating system commands with root privileges.

Deeper analysisAI

CVE-2026-28774 is an OS Command Injection vulnerability (CWE-78) in the web-based Traceroute diagnostic utility of the International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. Published on 2026-03-04, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and potential for significant impacts on confidentiality, integrity, and availability.

An authenticated attacker with low privileges (PR:L) can exploit the vulnerability by injecting arbitrary shell metacharacters, such as the pipe `|` operator, into the flags parameter of the Traceroute utility. Successful exploitation enables the execution of arbitrary operating system commands with root privileges, allowing full control over the affected device.

Mitigation details are available in the referenced advisory at https://www.abdulmhsblog.com/posts/sfx2100-vulns/.

Details

CWE(s)

Affected Products

datacast
sfx2100 firmware
all versions

CVEs Like This One

CVE-2026-28773Same product: Datacast Sfx2100
CVE-2026-28775Same product: Datacast Sfx2100
CVE-2026-28770Same product: Datacast Sfx2100
CVE-2026-29124Same product: Datacast Sfx2100
CVE-2026-29127Same product: Datacast Sfx2100
CVE-2026-29126Same product: Datacast Sfx2100
CVE-2026-29121Same product: Datacast Sfx2100
CVE-2026-28776Same product: Datacast Sfx2100
CVE-2026-28778Same product: Datacast Sfx2100
CVE-2026-29123Same product: Datacast Sfx2100

References