Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2533: Command Injection in Tosei Self-service Washing Machine

0
Medium
VulnerabilityCVE-2026-2533cvecve-2026-2533
Published: Mon Feb 16 2026 (02/16/2026, 03:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Tosei
Product: Self-service Washing Machine

Description

A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function of the file /cgi-bin/tosei_datasend.php. Executing a manipulation of the argument adr_txt_1 can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/16/2026, 04:33:38 UTC

Technical Analysis

CVE-2026-2533 is a command injection vulnerability affecting Tosei Self-service Washing Machine firmware version 4.02. The vulnerability resides in the /cgi-bin/tosei_datasend.php script, where the parameter adr_txt_1 is improperly sanitized, allowing attackers to inject arbitrary shell commands. This flaw can be exploited remotely without authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to full command execution on the device, potentially allowing attackers to manipulate machine operations, disrupt services, or pivot into connected networks. The vulnerability was responsibly disclosed, but the vendor has not issued any response or patch, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and partial impact on confidentiality, integrity, and availability (VC:L/VI:L/VA:L). Although no known exploits are currently active in the wild, proof-of-concept code has been published, which could facilitate future attacks. The affected product is a self-service washing machine commonly deployed in public or commercial laundromats, which may be connected to enterprise or facility networks, increasing the potential attack surface.

Potential Impact

For European organizations, this vulnerability poses risks primarily to laundromats, hospitality venues, and public facilities using Tosei self-service washing machines. Exploitation could lead to unauthorized control over washing machines, causing service disruption or denial of service, impacting customer experience and operational continuity. More critically, if these devices are connected to broader facility networks, attackers could leverage the command injection to move laterally, potentially compromising sensitive systems or data. The lack of vendor response and patches increases exposure duration. Additionally, compromised machines could be used as footholds for further attacks or as part of botnets. The impact on confidentiality is limited but not negligible if attackers access network credentials or logs. Integrity and availability impacts are more pronounced, as attackers can alter machine behavior or disable services. This threat is particularly relevant for organizations with large-scale deployments or those in sectors where service availability is critical.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, isolate Tosei washing machines on segmented networks with strict firewall rules to prevent unauthorized remote access to the /cgi-bin/tosei_datasend.php endpoint. Disable any unnecessary remote management interfaces or services on these devices. Employ network monitoring and intrusion detection systems to identify anomalous command injection attempts targeting the adr_txt_1 parameter. Where possible, replace or upgrade devices to versions without this vulnerability or from alternative vendors. Conduct regular security assessments of IoT and facility devices to detect similar vulnerabilities. Educate facility management staff on the risks and signs of exploitation. Finally, maintain incident response plans that include IoT device compromise scenarios to ensure rapid containment if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:12:14.856Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69929abfbda29fb02f425d33

Added to database: 2/16/2026, 4:19:11 AM

Last enriched: 2/16/2026, 4:33:38 AM

Last updated: 2/21/2026, 12:18:09 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats