CVE-2026-20169
MEDIUMCisco IoT Field Network Director Command Injection Vulnerability
Title source: cnaDescription
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to access files and execute commands on a remote router. This vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to create, read, or delete files and execute limited commands in user EXEC mode on a remote router.
References (1)
Core 1
Core References
cisco-sa-iot-fnd-dos-n8N26Q4u
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iot-fnd-dos-n8N26Q4u
Scores
CVSS v3
6.4
EPSS
0.0008
EPSS Percentile
23.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-77
Status
published
Products (30)
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.1.0
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.1.1
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.1.2
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.1.3
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.10.0
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.11.0
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.12.0
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.12.1
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.2.0
Cisco/Cisco IoT Field Network Director (IoT-FND)
4.3.0
... and 20 more
Published
May 06, 2026
Tracked Since
May 06, 2026