SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 bigvoice2
Sound4 bigvoice4
Sound4 first
Sound4 impact
Sound4 pulse-eco
Sound4 stream
Vendors & Products Sound4
Sound4 bigvoice2
Sound4 bigvoice4
Sound4 first
Sound4 impact
Sound4 pulse-eco
Sound4 stream

Tue, 30 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Title SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via dns.php
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-05T19:41:05.445Z

Reserved: 2025-12-26T16:41:38.889Z

Link: CVE-2022-50789

cve-icon Vulnrichment

Updated: 2026-01-05T19:41:02.179Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-30T23:15:45.557

Modified: 2025-12-31T20:42:43.210

Link: CVE-2022-50789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:19:19Z

Weaknesses