Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2668: Improper Access Controls in Rongzhitong Visual Integrated Command and Dispatch Platform

0
Medium
VulnerabilityCVE-2026-2668cvecve-2026-2668
Published: Wed Feb 18 2026 (02/18/2026, 20:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Rongzhitong
Product: Visual Integrated Command and Dispatch Platform

Description

A vulnerability was found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. This affects an unknown function of the file /dm/dispatch/user/add of the component User Handler. The manipulation results in improper access controls. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:37:58 UTC

Technical Analysis

CVE-2026-2668 identifies an improper access control vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform, specifically affecting the /dm/dispatch/user/add function within the User Handler component. This flaw allows remote attackers to bypass authentication and authorization mechanisms, enabling unauthorized manipulation of user-related operations. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS 4.0 base score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential impact on confidentiality, integrity, and availability, albeit with limited scope and no privilege escalation. The vendor has not issued a patch or official response, despite early notification, and a public exploit has been disclosed, raising the risk of exploitation. The platform is typically used in command and dispatch environments, which are critical for public safety and emergency response, making this vulnerability particularly sensitive. The lack of authentication requirements and the ability to remotely trigger the flaw mean attackers could potentially add or manipulate user accounts or dispatch commands, disrupting operations or gaining further access. No mitigations or patches have been published, necessitating immediate defensive measures by affected organizations.

Potential Impact

The vulnerability could allow attackers to perform unauthorized actions on the command and dispatch platform, potentially leading to unauthorized access to sensitive operational data, manipulation of dispatch commands, or disruption of emergency response workflows. This could degrade the integrity and availability of critical public safety systems, causing delays or errors in emergency services. Confidentiality may also be compromised if attackers access sensitive user or operational data. The remote, unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments exposed to untrusted networks. The absence of vendor patches and the existence of public exploits elevate the risk of exploitation. Organizations relying on this platform for critical infrastructure or emergency management face operational risks, reputational damage, and potential regulatory consequences if the vulnerability is exploited.

Mitigation Recommendations

Since no official patch is available, organizations should implement immediate compensating controls. These include isolating the affected platform within a secure network segment with strict firewall rules limiting access to trusted IPs only. Employ network intrusion detection and prevention systems to monitor and block suspicious traffic targeting the /dm/dispatch/user/add endpoint. Enforce strong authentication and authorization policies at network and application layers where possible, including VPN access or zero-trust network access solutions. Conduct thorough logging and continuous monitoring of user management and dispatch-related activities to detect anomalies. Engage with the vendor for updates and consider alternative platforms if remediation is delayed. Additionally, conduct security awareness training for administrators to recognize and respond to potential exploitation attempts. Regularly review and update incident response plans to address potential exploitation scenarios involving this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T09:10:15.714Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699631fa6aea4a407aeb569a

Added to database: 2/18/2026, 9:41:14 PM

Last enriched: 2/28/2026, 1:37:58 PM

Last updated: 4/4/2026, 9:12:04 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses