Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27174: Improper Control of Generation of Code ('Code Injection') in sergejey MajorDoMo

0
Critical
VulnerabilityCVE-2026-27174cvecve-2026-27174
Published: Wed Feb 18 2026 (02/18/2026, 21:10:36 UTC)
Source: CVE Database V5
Vendor/Project: sergejey
Product: MajorDoMo

Description

CVE-2026-27174 is a critical unauthenticated remote code execution vulnerability in MajorDoMo, a home automation platform. The flaw arises from an include order bug in modules/panel. class. php, where execution continues after a redirect() call without an exit, allowing unauthenticated access to an ajax handler. This handler uses user-supplied GET parameters directly in an eval() call without authentication, enabling attackers to execute arbitrary PHP code remotely. The vulnerability has a CVSS 4. 0 score of 9. 3, indicating high impact and ease of exploitation without user interaction or privileges. There are no known exploits in the wild yet. European organizations using MajorDoMo should urgently assess exposure and apply mitigations.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:41:59 UTC

Technical Analysis

CVE-2026-27174 is a severe vulnerability affecting MajorDoMo, a home automation platform developed by sergejey. The root cause is an include order bug in the file modules/panel.class.php, where a redirect() call intended to prevent unauthorized access does not terminate execution due to a missing exit statement. This allows unauthenticated HTTP requests to reach the ajax handler in inc_panel_ajax.php. Within this handler, the console feature processes user input from GET parameters (ajax_panel, op, and command) and passes them directly to PHP's eval() function without any authentication or sanitization. The use of register_globals further exacerbates the risk by allowing GET parameters to influence the execution context. Consequently, an attacker can craft a GET request to /admin.php with specific parameters to execute arbitrary PHP code remotely, leading to full system compromise. The vulnerability requires no authentication, no user interaction, and can be exploited over the network, making it highly dangerous. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects its criticality, with high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the straightforward exploitation method and critical severity warrant immediate attention from users of MajorDoMo.

Potential Impact

For European organizations, the impact of this vulnerability is significant. MajorDoMo is used in smart home and building automation, often controlling critical infrastructure such as HVAC, lighting, security systems, and other IoT devices. Exploitation could allow attackers to gain full control over these systems, potentially leading to unauthorized surveillance, disruption of building operations, physical safety risks, and data breaches. The unauthenticated nature of the exploit means attackers can compromise systems remotely without prior access, increasing the likelihood of attacks. Organizations relying on MajorDoMo for automation in offices, residential complexes, or industrial environments face risks of operational downtime, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The lack of known exploits currently provides a window for proactive defense, but the critical severity suggests rapid exploitation attempts are likely once public proof-of-concept code emerges.

Mitigation Recommendations

To mitigate CVE-2026-27174, European organizations should take immediate and specific actions beyond generic advice: 1) Restrict network access to the MajorDoMo admin panel by implementing firewall rules or VPN-only access to prevent unauthorized external connections. 2) Disable or remove the vulnerable PHP console feature if it is not essential for operations, as it is the direct attack vector. 3) Apply code-level patches or workarounds to ensure that redirect() calls in modules/panel.class.php are followed by exit statements to prevent execution flow continuation. 4) If patching is not immediately possible, implement web application firewall (WAF) rules to detect and block requests containing suspicious GET parameters (ajax_panel, op, command) targeting /admin.php. 5) Monitor logs for unusual access patterns or attempts to invoke the console handler. 6) Conduct a thorough audit of all MajorDoMo instances within the organization to identify exposed systems. 7) Engage with the vendor or community to obtain official patches or updates as soon as they become available. 8) Educate IT and security teams about the vulnerability to ensure rapid incident response if exploitation attempts are detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-18T15:22:30.052Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962e786aea4a407ae921ea

Added to database: 2/18/2026, 9:26:16 PM

Last enriched: 2/18/2026, 9:41:59 PM

Last updated: 2/19/2026, 8:14:23 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats