and prior, enabling an authenticated attacker to achieve remote code
execution on the system by modifying malicious input injected into the
MBird SMS service URL and/or code via the utility route which is later
processed during system setup, leading to remote code execution.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by modifying malicious input injected into the MBird SMS service URL and/or code via the utility route which is later processed during system setup, leading to remote code execution. | |
| Title | Copeland XWEB and XWEB Pro OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-27T01:06:42.223Z
Reserved: 2026-02-23T16:21:11.631Z
Link: CVE-2026-3037
No data.
Status : Received
Published: 2026-02-27T02:16:20.330
Modified: 2026-02-27T02:16:20.330
Link: CVE-2026-3037
No data.
OpenCVE Enrichment
No data.