Description
SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.
Exploits (1)
References (6)
Scores
CVSS v3
8.8
EPSS
0.0043
EPSS Percentile
62.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (7)
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
10100L
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
10100L/G3
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
1050
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
1050/G3
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
505
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
515
INIM Electronics s.r.l./SmartLiving SmartLAN/G/SI
<=6.0
Published
Jan 08, 2026
Tracked Since
Feb 18, 2026