CVE-2026-20169

MEDIUM

Cisco IoT Field Network Director Command Injection Vulnerability

Title source: cna
STIX 2.1

Description

A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to access files and execute commands on a remote router. This vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to create, read, or delete files and execute limited commands in user EXEC mode on a remote router.

Scores

CVSS v3 6.4
EPSS 0.0008
EPSS Percentile 23.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-77
Status published
Products (30)
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.1.0
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.1.1
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.1.2
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.1.3
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.10.0
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.11.0
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.12.0
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.12.1
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.2.0
Cisco/Cisco IoT Field Network Director (IoT-FND) 4.3.0
... and 20 more
Published May 06, 2026
Tracked Since May 06, 2026