Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27175: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in sergejey MajorDoMo

0
Critical
VulnerabilityCVE-2026-27175cvecve-2026-27175
Published: Wed Feb 18 2026 (02/18/2026, 21:10:36 UTC)
Source: CVE Database V5
Vendor/Project: sergejey
Product: MajorDoMo

Description

CVE-2026-27175 is a critical unauthenticated OS command injection vulnerability in MajorDoMo, a home automation platform. The flaw arises from improper sanitization of user input in the rc/index. php endpoint, where shell metacharacters are not escaped, allowing injection of arbitrary commands. An attacker can exploit a race condition involving the cycle_execs. php script, which processes queued commands without authentication, to achieve remote code execution within seconds. This vulnerability requires no user interaction or privileges and affects all versions of MajorDoMo. The CVSS 4. 0 score is 9. 2, reflecting its high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and critical severity make it a significant threat.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:41:44 UTC

Technical Analysis

MajorDoMo, an open-source home automation platform developed by sergejey, suffers from a critical OS command injection vulnerability identified as CVE-2026-27175. The vulnerability exists in the rc/index.php endpoint, where the $param variable derived from user input is interpolated directly into a shell command string enclosed in double quotes without proper sanitization such as escapeshellarg(). This command string is then inserted into a database queue via the safe_exec() function, which itself does not perform any sanitization. The cycle_execs.php script, accessible via the web without authentication, retrieves commands from this queue and executes them using PHP's exec() function. A race condition can be exploited by an attacker who first triggers cycle_execs.php, which purges the queue and enters a polling loop, and then injects a malicious command through the rc endpoint while the worker is polling. Because shell metacharacters expand inside the double quotes, the attacker can execute arbitrary OS commands remotely within approximately one second. This vulnerability does not require authentication or user interaction, making it highly exploitable. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or known exploits are currently reported, but the vulnerability poses a severe risk to any deployment of MajorDoMo, especially in environments controlling critical smart home or building functions.

Potential Impact

For European organizations, the impact of this vulnerability is significant due to the potential for complete system compromise without authentication. Attackers could execute arbitrary commands on affected MajorDoMo servers, leading to unauthorized access, data theft, manipulation of home or building automation controls, and potential disruption of critical services such as heating, lighting, or security systems. This could result in privacy violations, physical safety risks, and operational downtime. The vulnerability's ease of exploitation and rapid execution window increase the likelihood of automated attacks or targeted intrusions. Organizations relying on MajorDoMo for smart building management or residential automation in Europe face risks of espionage, sabotage, or ransomware deployment. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2026-27175, organizations should immediately restrict access to the cycle_execs.php and rc/index.php endpoints, ideally limiting them to trusted internal networks or VPNs. Implement web application firewalls (WAFs) with rules to detect and block suspicious shell metacharacters or injection patterns targeting these endpoints. Developers or administrators should patch the MajorDoMo installation by applying input sanitization using escapeshellarg() or equivalent functions to properly escape all user-supplied parameters before command execution. If patches are unavailable, consider disabling or isolating the cycle_execs.php script to prevent command execution from the queue. Regularly audit and monitor logs for unusual command execution or queue manipulation attempts. Employ network segmentation to isolate smart home automation systems from critical enterprise infrastructure. Finally, maintain up-to-date backups and incident response plans tailored to potential remote code execution scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-18T15:22:30.053Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962e786aea4a407ae921ef

Added to database: 2/18/2026, 9:26:16 PM

Last enriched: 2/18/2026, 9:41:44 PM

Last updated: 2/19/2026, 8:14:22 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats