Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1192: Command Injection in Tosei Online Store Management System ネット店舗管理システム

0
Medium
VulnerabilityCVE-2026-1192cvecve-2026-1192
Published: Mon Jan 19 2026 (01/19/2026, 23:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tosei
Product: Online Store Management System ネット店舗管理システム

Description

A vulnerability was determined in Tosei Online Store Management System ネット店舗管理システム 1.01. The affected element is an unknown function of the file /cgi-bin/imode_alldata.php. Executing a manipulation of the argument DevId can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:04:25 UTC

Technical Analysis

CVE-2026-1192 identifies a command injection vulnerability in the Tosei Online Store Management System version 1.01, located in the /cgi-bin/imode_alldata.php script. The vulnerability arises from improper sanitization of the DevId parameter, which can be manipulated remotely by an unauthenticated attacker to inject and execute arbitrary system commands. This type of vulnerability is critical because it can lead to full system compromise, allowing attackers to alter, delete, or exfiltrate data, disrupt services, or pivot within the network. The attack vector requires no authentication or user interaction, increasing the risk of automated exploitation. The vendor was notified but has not issued any patches or advisories, and while public exploit details exist, no confirmed in-the-wild exploitation has been reported. The CVSS 4.0 score of 6.9 reflects the medium severity, factoring in the ease of exploitation and potential impact on confidentiality, integrity, and availability, though with limited scope and no privilege or user interaction requirements. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. The vulnerability affects only version 1.01 of the product, which is used primarily in online retail management, making e-commerce platforms particularly vulnerable.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized command execution on critical e-commerce infrastructure, resulting in data breaches, service disruptions, and potential financial losses. The integrity of transaction data and customer information could be compromised, undermining trust and regulatory compliance, especially under GDPR. Availability impacts could disrupt online store operations, causing revenue loss and reputational damage. Since the vulnerability allows remote unauthenticated exploitation, attackers could leverage it for initial access or lateral movement within corporate networks. The absence of vendor patches means organizations must rely on network defenses and monitoring to mitigate risk. Given the strategic importance of e-commerce in Europe and the sensitivity of customer data, this vulnerability poses a significant threat to affected businesses and their customers.

Mitigation Recommendations

In the absence of vendor patches, European organizations should immediately implement network-level access controls to restrict access to the vulnerable /cgi-bin/imode_alldata.php endpoint, ideally limiting it to trusted IP addresses or internal networks only. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the DevId parameter. Conduct thorough input validation and sanitization on all user-supplied data within the application if source code access is available. Monitor logs for unusual command execution attempts or anomalies related to the affected script. Isolate the affected system from critical internal networks to prevent lateral movement if compromise occurs. Regularly back up data and verify recovery procedures to minimize impact from potential exploitation. Engage in threat hunting activities focused on this vulnerability and update incident response plans accordingly. Finally, maintain communication with the vendor for any future patches or advisories and consider alternative software solutions if remediation is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-19T13:49:11.930Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ebc584623b1157cd378dc

Added to database: 1/19/2026, 11:20:56 PM

Last enriched: 1/27/2026, 8:04:25 PM

Last updated: 2/7/2026, 5:04:53 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats