Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23678: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Binardat Ltd. 10G08-0800GSM Network Switch

0
High
VulnerabilityCVE-2026-23678cvecve-2026-23678cwe-78
Published: Tue Feb 24 2026 (02/24/2026, 15:03:35 UTC)
Source: CVE Database V5
Vendor/Project: Binardat Ltd.
Product: 10G08-0800GSM Network Switch

Description

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:52:03 UTC

Technical Analysis

CVE-2026-23678 is an OS command injection vulnerability classified under CWE-78, affecting the Binardat Ltd. 10G08-0800GSM network switch firmware version V300SP10260209 and prior. The vulnerability resides in the traceroute diagnostic function accessible through the device's web management interface. Specifically, the hostname parameter in the traceroute function fails to properly neutralize special characters, allowing an authenticated attacker to inject the %1a character, which is interpreted by the underlying operating system shell. This injection enables execution of arbitrary CLI commands with the privileges of the web interface process. The vulnerability requires the attacker to have authenticated access to the web interface but does not require additional user interaction. The CVSS 4.0 base score is 8.7, reflecting network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability can lead to full device compromise, allowing attackers to manipulate network traffic, disrupt operations, or pivot into internal networks. No patches or mitigations have been officially released by Binardat as of the publication date, and no known exploits are currently in the wild. The vulnerability was reserved in January 2026 and published in February 2026, indicating recent discovery. The lack of segmentation or filtering on the web interface could facilitate exploitation in environments where the device management interface is exposed or accessible internally.

Potential Impact

The impact of CVE-2026-23678 is significant for organizations using the Binardat 10G08-0800GSM network switch. Successful exploitation allows attackers to execute arbitrary commands on the device, potentially leading to full control over the network switch. This can result in unauthorized network traffic manipulation, interception of sensitive data, disruption of network availability, and use of the compromised device as a foothold for lateral movement within the network. Critical infrastructure sectors relying on these switches for network connectivity could face operational outages or data breaches. The vulnerability threatens confidentiality, integrity, and availability of network communications. Given the device's role in network infrastructure, exploitation could have cascading effects on connected systems and services. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with weak authentication controls or insider threats. The absence of public exploits reduces immediate risk but also means organizations must proactively address the vulnerability before exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2026-23678, organizations should implement the following specific measures: 1) Restrict access to the Binardat 10G08-0800GSM web management interface to trusted administrative networks only, using network segmentation and firewall rules. 2) Enforce strong authentication mechanisms, including complex passwords and multi-factor authentication if supported, to reduce risk of unauthorized access. 3) Monitor web interface logs for unusual traceroute requests containing suspicious characters such as %1a or other special characters indicative of injection attempts. 4) Disable or restrict the traceroute diagnostic function if it is not essential for operations. 5) Employ network intrusion detection systems (NIDS) with signatures or anomaly detection tuned to detect command injection patterns targeting the traceroute function. 6) Engage with Binardat Ltd. for firmware updates or patches addressing this vulnerability and plan prompt deployment once available. 7) Conduct regular security assessments of network devices to identify unauthorized changes or signs of compromise. 8) Isolate management interfaces physically or logically from general user networks to minimize attack surface. These targeted actions go beyond generic advice by focusing on access control, monitoring, and disabling vulnerable functionality until a patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-14T17:13:44.903Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3ebe58cf853b290d4f

Added to database: 2/24/2026, 8:51:10 PM

Last enriched: 3/4/2026, 6:52:03 PM

Last updated: 4/9/2026, 11:16:35 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses