Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2820: SQL Injection in Fujian Smart Integrated Management Platform System

0
Medium
VulnerabilityCVE-2026-2820cvecve-2026-2820
Published: Fri Feb 20 2026 (02/20/2026, 02:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Fujian
Product: Smart Integrated Management Platform System

Description

CVE-2026-2820 is a medium severity SQL injection vulnerability found in Fujian Smart Integrated Management Platform System versions 7. 0 through 7. 5. The flaw exists in the /Module/CRXT/Controller/XAccessPermissionPlus. ashx endpoint, specifically via manipulation of the DeviceIDS parameter. This vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands, potentially leading to data leakage or modification. No user interaction or privileges are required to exploit this issue. Although no public exploits have been observed in the wild yet, proof-of-concept code has been released, increasing the risk of exploitation. The vulnerability affects confidentiality, integrity, and availability of the affected systems. Organizations using this platform should prioritize patching or applying mitigations to prevent unauthorized database access and potential system compromise.

AI-Powered Analysis

AILast updated: 02/20/2026, 02:31:46 UTC

Technical Analysis

CVE-2026-2820 is a SQL injection vulnerability identified in the Fujian Smart Integrated Management Platform System, specifically affecting versions 7.0 through 7.5. The vulnerability resides in the processing of the DeviceIDS parameter within the /Module/CRXT/Controller/XAccessPermissionPlus.ashx file. An attacker can remotely send crafted requests to this endpoint without requiring authentication or user interaction, injecting malicious SQL statements into the backend database queries. This injection flaw can allow attackers to read sensitive data, modify database contents, or disrupt service availability by executing arbitrary SQL commands. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with network attack vector, low attack complexity, and no privileges or user interaction needed. The scope is limited to the affected Fujian platform versions, and no known exploits have been observed in the wild yet, though proof-of-concept exploits have been publicly released. The vulnerability poses a significant risk to organizations relying on this platform for integrated management, as it could lead to unauthorized data access or system manipulation.

Potential Impact

The impact of CVE-2026-2820 is substantial for organizations using the Fujian Smart Integrated Management Platform System. Successful exploitation can compromise the confidentiality of sensitive data stored in the backend database by allowing attackers to extract information without authorization. Integrity is also at risk, as attackers may alter or delete critical data, potentially disrupting business operations or corrupting system configurations. Availability could be affected if attackers execute destructive SQL commands or cause database errors, leading to service outages. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface significantly. Organizations in sectors relying on this platform for integrated management—such as government, infrastructure, or industrial environments—may face operational disruptions, data breaches, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-2820, organizations should first verify if they are running affected versions (7.0 to 7.5) of the Fujian Smart Integrated Management Platform System. Since no official patches are currently listed, immediate steps include implementing strict input validation and sanitization on the DeviceIDS parameter to prevent injection of malicious SQL code. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint can provide interim protection. Network segmentation and restricting access to the management platform to trusted IP addresses reduce exposure. Monitoring logs for unusual query patterns or repeated access to the vulnerable endpoint can help detect exploitation attempts. Organizations should engage with the vendor for official patches or updates and plan timely deployment once available. Additionally, conducting regular security assessments and penetration tests focusing on injection flaws will help identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-19T17:17:49.621Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997c421d7880ec89b4b332d

Added to database: 2/20/2026, 2:17:05 AM

Last enriched: 2/20/2026, 2:31:46 AM

Last updated: 2/20/2026, 3:23:00 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats