Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.3

IDC SFX Series SuperFlex Satellite Receiver Web Interface Allows Remote Command Execution

CVE-2026-28773
Summary

An attacker with access to the web interface of the IDC SFX Series SuperFlex Satellite Receiver can run arbitrary system commands with root privileges, potentially allowing them to take control of the device. This is a serious risk because it could be used to disrupt the device's operation or steal sensitive information. Users should update to a fixed version of the software as soon as possible.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
datacast sfx2100_firmware All versions
Original title
The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite  Receiver Web Management Interface version 101 is vulnerable...
Original description
The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite  Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
nvd CVSS4.0 9.3
Vulnerability type
CWE-78 OS Command Injection
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026