{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:38:26.270","vulnerabilities":[{"cve":{"id":"CVE-2022-50789","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-12-30T23:15:45.557","lastModified":"2026-01-16T19:16:11.373","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SOUND4 IMPACT\/FIRST\/PULSE\/Eco <=2.x contains a command injection vulnerability that allows local authenticated users to create malicious files in the \/tmp directory with .dns.pid extension. Unauthenticated attackers can execute the malicious commands by making a single HTTP POST request to the vulnerable dns.php script, which triggers command execution and then deletes the file."},{"lang":"es","value":"SOUND4 IMPACT\/FIRST\/PULSE\/Eco &lt;=2.x contiene una vulnerabilidad de inyección de comandos que permite a usuarios locales autenticados crear archivos maliciosos en el directorio \/tmp con la extensión .dns.pid. Atacantes no autenticados pueden ejecutar los comandos maliciosos realizando una única solicitud HTTP POST al script vulnerable dns.php, lo que desencadena la ejecución de comandos y luego elimina el archivo."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0\/AV:L\/AC:L\/AT:N\/PR:L\/UI:N\/VC:H\/VI:H\/VA:H\/SC:N\/SI:N\/SA:N\/E:X\/CR:X\/IR:X\/AR:X\/MAV:X\/MAC:X\/MAT:X\/MPR:X\/MUI:X\/MVC:X\/MVI:X\/MVA:X\/MSC:X\/MSI:X\/MSA:X\/S:X\/AU:X\/R:X\/V:X\/RE:X\/U:X","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"33C347FE-DA7B-4137-87B8-E6A8AF4D307F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0A735654-A166-4B56-BF4D-F165B7E11043"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"5C4CF02A-8CF1-46FF-9EC0-FF779D60B6EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EC9BD81B-573A-4DA7-AC47-6C8AF1B6B18F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"18E34118-F11B-4BF2-BE23-7DAE0A6790FB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C46BF88C-955C-4F9E-B782-1EADA068F19D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"E0699DEA-9CDA-4BB4-8FA3-6A6FADE1A61E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*","matchCriteriaId":"051868AE-E364-4CB3-B927-42B4E0C19D01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"FBDECDEC-C5A2-4B0D-B3E0-58CCCC804BCF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4EF10967-A7DC-4DF0-94BE-935FFC1888D6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"713CC97E-CC0A-41B8-B8CA-EAD8F774F77C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C4034A51-85E1-44E7-973B-7BFFFB083832"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"5ED99BE5-4598-4D5C-B0F0-3BE6E5B05C10"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"B4B0A611-C50E-4397-ACDF-8D090D4AFC88"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"9A3C132F-ACCE-4618-8EC2-31624571F0BF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"71E155FD-162E-4EA9-9BD9-89384B3AD175"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*","matchCriteriaId":"DFF4C955-E4AF-4A3A-89F9-481CE5DB7BF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*","matchCriteriaId":"404A1397-CD88-4CB5-99B9-B84F3359E13F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*","matchCriteriaId":"45230C2E-D043-45F5-869F-FEB0A3AEB5DE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*","matchCriteriaId":"8C68C1DC-EC1C-445B-B78C-6E4B64BB5DB0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*","matchCriteriaId":"05D5318D-BD08-4D8E-9D94-4D0FD0C0023E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*","matchCriteriaId":"ED8E14DD-2C04-4080-AAE9-6D770436AC6C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*","matchCriteriaId":"DFFD1447-69A1-4FA0-B285-6F16D9113558"}]}]}],"references":[{"url":"https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/247922","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https:\/\/packetstormsecurity.com\/files\/170260\/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-dns.php-Command-Injection.html","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/www.sound4.com\/","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https:\/\/www.vulncheck.com\/advisories\/sound-impactfirstpulseeco-x-conditional-command-injection-via-dnsphp","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https:\/\/www.zeroscience.mk\/en\/vulnerabilities\/ZSL-2022-5733.php","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]}]}}]}