{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T10:53:34.548","vulnerabilities":[{"cve":{"id":"CVE-2023-53963","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-12-22T22:16:00.693","lastModified":"2026-01-13T15:42:50.763","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated OS command injection vulnerability that allows remote attackers to execute arbitrary shell commands through the 'password' parameter. Attackers can exploit the login.php and index.php scripts by injecting shell commands via the 'password' POST parameter to execute commands with web server privileges."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"33C347FE-DA7B-4137-87B8-E6A8AF4D307F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0A735654-A166-4B56-BF4D-F165B7E11043"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"5C4CF02A-8CF1-46FF-9EC0-FF779D60B6EA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EC9BD81B-573A-4DA7-AC47-6C8AF1B6B18F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"18E34118-F11B-4BF2-BE23-7DAE0A6790FB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C46BF88C-955C-4F9E-B782-1EADA068F19D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"E0699DEA-9CDA-4BB4-8FA3-6A6FADE1A61E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*","matchCriteriaId":"051868AE-E364-4CB3-B927-42B4E0C19D01"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*","matchCriteriaId":"FBDECDEC-C5A2-4B0D-B3E0-58CCCC804BCF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4EF10967-A7DC-4DF0-94BE-935FFC1888D6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*","matchCriteriaId":"713CC97E-CC0A-41B8-B8CA-EAD8F774F77C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C4034A51-85E1-44E7-973B-7BFFFB083832"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"5ED99BE5-4598-4D5C-B0F0-3BE6E5B05C10"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"B4B0A611-C50E-4397-ACDF-8D090D4AFC88"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*","matchCriteriaId":"9A3C132F-ACCE-4618-8EC2-31624571F0BF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*","matchCriteriaId":"71E155FD-162E-4EA9-9BD9-89384B3AD175"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*","matchCriteriaId":"DFF4C955-E4AF-4A3A-89F9-481CE5DB7BF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*","matchCriteriaId":"404A1397-CD88-4CB5-99B9-B84F3359E13F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*","matchCriteriaId":"45230C2E-D043-45F5-869F-FEB0A3AEB5DE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*","matchCriteriaId":"8C68C1DC-EC1C-445B-B78C-6E4B64BB5DB0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*","matchCriteriaId":"05D5318D-BD08-4D8E-9D94-4D0FD0C0023E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*","matchCriteriaId":"ED8E14DD-2C04-4080-AAE9-6D770436AC6C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*","matchCriteriaId":"DFFD1447-69A1-4FA0-B285-6F16D9113558"}]}]}],"references":[{"url":"https://web.archive.org/web/20221207074555/https://www.sound4.com/","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://www.exploit-db.com/exploits/51173","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-unauthenticated-remote-command-injection","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5738.php","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5738.php","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}