{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T12:55:29.111","vulnerabilities":[{"cve":{"id":"CVE-2022-50795","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-12-30T23:15:46.580","lastModified":"2026-01-16T19:16:12.117","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a conditional command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the traceroute.php script, which triggers the malicious file and then deletes it after execution."},{"lang":"es","value":"SOUND4 IMPACT/FIRST/PULSE/Eco &lt;=2.x contiene una vulnerabilidad de inyección de comandos condicional que permite a usuarios locales autenticados crear archivos maliciosos en el directorio /tmp. Atacantes no autenticados pueden ejecutar comandos realizando una única solicitud HTTP POST al script traceroute.php, lo que activa el archivo malicioso y luego lo elimina después de la ejecución."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"33C347FE-DA7B-4137-87B8-E6A8AF4D307F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0A735654-A166-4B56-BF4D-F165B7E11043"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"5C4CF02A-8CF1-46FF-9EC0-FF779D60B6EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EC9BD81B-573A-4DA7-AC47-6C8AF1B6B18F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"18E34118-F11B-4BF2-BE23-7DAE0A6790FB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C46BF88C-955C-4F9E-B782-1EADA068F19D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"E0699DEA-9CDA-4BB4-8FA3-6A6FADE1A61E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*","matchCriteriaId":"051868AE-E364-4CB3-B927-42B4E0C19D01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"FBDECDEC-C5A2-4B0D-B3E0-58CCCC804BCF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4EF10967-A7DC-4DF0-94BE-935FFC1888D6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"713CC97E-CC0A-41B8-B8CA-EAD8F774F77C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C4034A51-85E1-44E7-973B-7BFFFB083832"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"5ED99BE5-4598-4D5C-B0F0-3BE6E5B05C10"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"B4B0A611-C50E-4397-ACDF-8D090D4AFC88"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"9A3C132F-ACCE-4618-8EC2-31624571F0BF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"71E155FD-162E-4EA9-9BD9-89384B3AD175"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*","matchCriteriaId":"DFF4C955-E4AF-4A3A-89F9-481CE5DB7BF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*","matchCriteriaId":"404A1397-CD88-4CB5-99B9-B84F3359E13F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*","matchCriteriaId":"45230C2E-D043-45F5-869F-FEB0A3AEB5DE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*","matchCriteriaId":"8C68C1DC-EC1C-445B-B78C-6E4B64BB5DB0"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*","matchCriteriaId":"DFFD1447-69A1-4FA0-B285-6F16D9113558"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*","matchCriteriaId":"05D5318D-BD08-4D8E-9D94-4D0FD0C0023E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*","matchCriteriaId":"ED8E14DD-2C04-4080-AAE9-6D770436AC6C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/247950","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://packetstormsecurity.com/files/170267/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-traceroute.php-Conditional-Command-Injection.html","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.sound4.com/","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-traceroutephp","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5740.php","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]}]}}]}