Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2686: OS Command Injection in SECCN Dingcheng G10

0
Critical
VulnerabilityCVE-2026-2686cvecve-2026-2686
Published: Thu Feb 19 2026 (02/19/2026, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SECCN Dingcheng
Product: G10

Description

CVE-2026-2686 is a critical OS command injection vulnerability affecting SECCN Dingcheng G10 version 3. 1. 0. 181203. The flaw exists in the /cgi-bin/session_login. cgi script, specifically in the 'qq' function, where the 'User' argument is improperly sanitized, allowing remote attackers to execute arbitrary OS commands without authentication or user interaction. This vulnerability has a CVSS 4. 0 base score of 9. 3, indicating high impact on confidentiality, integrity, and availability. Although no public exploits are currently observed in the wild, the exploit code has been disclosed, increasing the risk of exploitation.

AI-Powered Analysis

AILast updated: 02/19/2026, 00:25:32 UTC

Technical Analysis

CVE-2026-2686 is a critical remote OS command injection vulnerability found in SECCN Dingcheng G10 firmware version 3.1.0.181203. The vulnerability resides in the 'qq' function within the /cgi-bin/session_login.cgi script, where the 'User' parameter is insufficiently sanitized, allowing an attacker to inject arbitrary operating system commands. This flaw can be exploited remotely over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects the ease of exploitation and the severe impact on confidentiality, integrity, and availability. Successful exploitation could lead to full system compromise, enabling attackers to execute arbitrary commands, potentially leading to data theft, system manipulation, or denial of service. Although no active exploits have been reported in the wild, the public disclosure of exploit details increases the likelihood of imminent attacks. The vulnerability affects a specific version of the SECCN Dingcheng G10 product, commonly used in networked environments, possibly including industrial or enterprise settings. The lack of available patches at the time of disclosure necessitates immediate interim protective measures.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for complete system compromise without any authentication barrier. Attackers could gain unauthorized access to sensitive data, disrupt critical services, or use compromised devices as footholds for lateral movement within networks. Organizations relying on SECCN Dingcheng G10 devices in operational technology (OT) or IT environments may face operational downtime, data breaches, and reputational damage. The critical severity and remote exploitability increase the urgency, especially for sectors such as manufacturing, energy, telecommunications, and government infrastructure. The impact is magnified in environments where these devices are exposed to untrusted networks or lack sufficient network segmentation. Additionally, the absence of patches at disclosure time means organizations must rely on compensating controls to mitigate risk, increasing operational complexity and potential exposure windows.

Mitigation Recommendations

1. Immediately restrict network access to the /cgi-bin/session_login.cgi endpoint by implementing firewall rules or access control lists to limit exposure to trusted management networks only. 2. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with signatures or heuristics capable of detecting and blocking OS command injection attempts targeting the 'User' parameter. 3. Monitor network traffic and device logs for unusual command execution patterns or unexpected system behavior indicative of exploitation attempts. 4. Engage with SECCN Dingcheng vendor support to obtain patches or firmware updates addressing this vulnerability as soon as they become available and prioritize their deployment. 5. Conduct a thorough inventory of all SECCN Dingcheng G10 devices in the environment to identify and isolate vulnerable units. 6. Implement network segmentation to isolate critical devices and limit lateral movement in case of compromise. 7. Educate security teams about the specific indicators of compromise related to this vulnerability to enhance detection capabilities. 8. Consider temporary disabling or replacing vulnerable devices if patching is delayed and risk is unacceptable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T14:09:31.781Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699655226aea4a407af3e26b

Added to database: 2/19/2026, 12:11:14 AM

Last enriched: 2/19/2026, 12:25:32 AM

Last updated: 2/19/2026, 2:16:21 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats