SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sound4 big Voice2
Sound4 big Voice2 Firmware Sound4 big Voice4 Sound4 big Voice4 Firmware Sound4 first Firmware Sound4 impact Eco Sound4 impact Eco Firmware Sound4 impact Firmware Sound4 pulse Sound4 pulse Eco Sound4 pulse Eco Firmware Sound4 pulse Firmware Sound4 stream Extension Sound4 wm2 Sound4 wm2 Firmware |
|
| CPEs | cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:* cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:* cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:* cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:* cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sound4 big Voice2
Sound4 big Voice2 Firmware Sound4 big Voice4 Sound4 big Voice4 Firmware Sound4 first Firmware Sound4 impact Eco Sound4 impact Eco Firmware Sound4 impact Firmware Sound4 pulse Sound4 pulse Eco Sound4 pulse Eco Firmware Sound4 pulse Firmware Sound4 stream Extension Sound4 wm2 Sound4 wm2 Firmware |
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sound4
Sound4 bigvoice2 Sound4 bigvoice4 Sound4 first Sound4 impact Sound4 pulse-eco Sound4 stream |
|
| Vendors & Products |
Sound4
Sound4 bigvoice2 Sound4 bigvoice4 Sound4 first Sound4 impact Sound4 pulse-eco Sound4 stream |
Tue, 30 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file. | |
| Title | SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Conditional Command Injection via dns.php | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-30T22:41:36.629Z
Updated: 2026-01-05T19:41:05.445Z
Reserved: 2025-12-26T16:41:38.889Z
Link: CVE-2022-50789
Updated: 2026-01-05T19:41:02.179Z
Status : Analyzed
Published: 2025-12-30T23:15:45.557
Modified: 2026-01-13T15:05:32.847
Link: CVE-2022-50789
No data.