An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
providing malicious input via the device hostname configuration which
is later processed during system setup, resulting in remote code
execution.
Copeland has provided a fix for the vulnerabilities and recommends users
update the XWEB Pro to the latest version by going to their software
update page
https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the
sections dedicated to the different XWEBPRO models page.
Alternatively, a user logged into an XWEB Pro with internet access can
update XWEB Pro directly from Copeland servers via the menu SYSTEM --
Updates | Network.
Configurations
Workarounds
Exploits
Credits
finder
Amir Zaltzman and Noam Moshe of Claroty Team82 reported this vulnerability to CISA.