An OS command injection

vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into the devices field of the firmware update
apply action.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the devices field of the firmware update apply action.
Title Copeland XWEB and XWEB Pro OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-02-27T00:47:26.332Z

Reserved: 2026-02-05T16:55:52.404Z

Link: CVE-2026-24689

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-27T01:16:18.983

Modified: 2026-02-27T01:16:18.983

Link: CVE-2026-24689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses