Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25105: CWE-78 in Copeland Copeland XWEB 300D PRO

0
High
VulnerabilityCVE-2026-25105cvecve-2026-25105cwe-78
Published: Fri Feb 27 2026 (02/27/2026, 00:52:21 UTC)
Source: CVE Database V5
Vendor/Project: Copeland
Product: Copeland XWEB 300D PRO

Description

CVE-2026-25105 is a high-severity OS command injection vulnerability affecting Copeland XWEB 300D PRO devices running version 1. 12. 1 and earlier. An authenticated attacker with high privileges can exploit this flaw by injecting malicious input into parameters of the Modbus command tool accessible via the debug route, resulting in remote code execution. This vulnerability impacts confidentiality, integrity, and availability of the affected systems and can lead to full system compromise. Exploitation requires authentication and high privileges, and no user interaction is needed. Although no known exploits are currently in the wild, the vulnerability's critical nature demands immediate attention. Organizations using these devices in industrial control or building management environments should prioritize patching or mitigating this issue. Countries with significant deployment of Copeland XWEB 300D PRO and critical infrastructure relying on these systems are at higher risk. Mitigation includes restricting access to debug interfaces, applying vendor patches when available, and monitoring for suspicious activity related to Modbus command usage.

AI-Powered Analysis

AILast updated: 02/27/2026, 01:41:23 UTC

Technical Analysis

CVE-2026-25105 is an OS command injection vulnerability categorized under CWE-78, impacting Copeland XWEB 300D PRO devices, specifically versions 1.12.1 and prior. The vulnerability arises from improper input validation in the Modbus command tool parameters exposed through the device's debug route. An attacker who has authenticated access with high privileges can inject arbitrary OS commands, leading to remote code execution on the device. This allows the attacker to execute commands with the same privileges as the vulnerable service, potentially taking full control of the device. The vulnerability affects the confidentiality, integrity, and availability of the system, as attackers can manipulate device operations, exfiltrate sensitive data, or disrupt services. The CVSS v3.1 base score is 8.0, reflecting high severity due to network attack vector, high privileges required, no user interaction, and a scope change indicating impact beyond the vulnerable component. No public exploits are known yet, but the vulnerability's nature makes it a significant risk for industrial control systems and building management systems relying on these devices. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

This vulnerability poses a significant risk to organizations deploying Copeland XWEB 300D PRO devices, especially in industrial control systems (ICS), building automation, and HVAC management. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary commands, manipulate device behavior, disrupt operations, or exfiltrate sensitive information. This can result in operational downtime, safety hazards, financial losses, and damage to organizational reputation. Given the device's role in critical infrastructure environments, exploitation could have cascading effects on broader industrial processes or facility management. The requirement for authenticated access with high privileges somewhat limits the attack surface but does not eliminate risk, as insider threats or compromised credentials could enable exploitation. The absence of known exploits reduces immediate widespread threat but does not preclude targeted attacks. Organizations globally that rely on these devices for critical functions should consider this vulnerability a high priority for remediation.

Mitigation Recommendations

1. Immediately restrict access to the debug route and Modbus command tool interfaces to trusted administrators only, using network segmentation and access control lists (ACLs). 2. Implement strong authentication mechanisms and enforce least privilege principles to minimize the risk of credential compromise or misuse. 3. Monitor device logs and network traffic for unusual Modbus command activity or unexpected command executions indicative of exploitation attempts. 4. Coordinate with Copeland for timely release and deployment of security patches addressing this vulnerability; apply patches as soon as they become available. 5. Employ intrusion detection/prevention systems (IDS/IPS) tailored for industrial protocols to detect and block malicious command injections. 6. Conduct regular security audits and penetration tests focusing on device interfaces and authentication controls. 7. Educate operational technology (OT) personnel about the risks of this vulnerability and best practices for secure device management. 8. Consider deploying compensating controls such as application whitelisting or endpoint protection on devices where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-05T16:47:16.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0f2b332ffcdb8a2981621

Added to database: 2/27/2026, 1:26:11 AM

Last enriched: 2/27/2026, 1:41:23 AM

Last updated: 2/27/2026, 3:48:16 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses