Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27174: Improper Control of Generation of Code ('Code Injection') in sergejey MajorDoMo

0
Critical
VulnerabilityCVE-2026-27174cvecve-2026-27174
Published: Wed Feb 18 2026 (02/18/2026, 21:10:36 UTC)
Source: CVE Database V5
Vendor/Project: sergejey
Product: MajorDoMo

Description

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:03:35 UTC

Technical Analysis

CVE-2026-27174 is a severe code injection vulnerability affecting MajorDoMo, an open-source home automation platform developed by sergejey. The root cause is an include order bug in the file modules/panel.class.php, where a redirect() call intended to prevent unauthorized access lacks an exit statement, allowing execution to continue. This flaw permits unauthenticated HTTP requests to reach the ajax handler in inc_panel_ajax.php. Within this handler, the console feature processes user input from GET parameters (ajax_panel, op, and command) and directly passes these inputs to PHP's eval() function via the legacy register_globals mechanism without any authentication or input validation. This results in arbitrary PHP code execution on the server. The vulnerability requires no privileges or user interaction, making it trivially exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no authentication or user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation make it a critical threat. The affected version is listed as '0', which likely refers to early or default versions of MajorDoMo. The lack of an official patch link suggests that users must monitor vendor advisories closely. This vulnerability allows attackers to fully compromise affected systems, potentially leading to data theft, system manipulation, or pivoting within networks.

Potential Impact

The impact of CVE-2026-27174 is severe for organizations using MajorDoMo in their home or building automation environments. Successful exploitation grants attackers full remote code execution capabilities without authentication, enabling complete system compromise. This can lead to unauthorized access to sensitive data, manipulation or disruption of automation controls, and potential use of the compromised system as a foothold for lateral movement within internal networks. The breach of confidentiality, integrity, and availability can result in privacy violations, operational downtime, and safety risks, especially if critical automation functions are controlled. Given the nature of MajorDoMo as a domestic module, affected systems may be deployed in residential, commercial, or industrial settings, amplifying the potential consequences. The ease of exploitation and network accessibility make this vulnerability attractive to attackers, increasing the likelihood of targeted or opportunistic attacks. Organizations worldwide relying on MajorDoMo should consider this a high-priority threat requiring immediate attention.

Mitigation Recommendations

To mitigate CVE-2026-27174, organizations should take the following specific actions: 1) Immediately check for and apply any official patches or updates released by the MajorDoMo project addressing this vulnerability. 2) If patches are not yet available, restrict network access to the /admin.php endpoint, especially the ajax_panel functionality, by implementing firewall rules or network segmentation to limit exposure only to trusted administrators. 3) Disable or remove the PHP console feature within MajorDoMo if it is not essential, reducing the attack surface. 4) Implement web application firewalls (WAFs) with custom rules to detect and block suspicious GET requests containing code injection patterns targeting the ajax_panel parameters. 5) Monitor server logs for unusual or unauthorized access attempts to /admin.php and related ajax handlers. 6) Consider deploying runtime application self-protection (RASP) solutions that can detect and prevent eval() based code injection at runtime. 7) Educate administrators on the risks of exposing administrative interfaces publicly and enforce strong access controls and authentication mechanisms. 8) Review and disable legacy PHP features like register_globals if possible, as they contribute to the vulnerability. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable components and attack vectors involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-18T15:22:30.052Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962e786aea4a407ae921ea

Added to database: 2/18/2026, 9:26:16 PM

Last enriched: 3/7/2026, 9:03:35 PM

Last updated: 4/9/2026, 7:05:49 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses