{"id": "CVE-2022-50795", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "disclosure@vulncheck.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}, {"type": "Secondary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}], "cvssMetricV40": [{"type": "Secondary", "source": "disclosure@vulncheck.com", "cvssData": {"Safety": "NOT_DEFINED", "version": "4.0", "Recovery": "NOT_DEFINED", "baseScore": 8.5, "Automatable": "NOT_DEFINED", "attackVector": "LOCAL", "baseSeverity": "HIGH", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "subIntegrityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "vulnAvailabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subConfidentialityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED"}}]}, "published": "2025-12-30T23:15:46.580", "references": [{"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247950", "tags": ["Third Party Advisory"], "source": "disclosure@vulncheck.com"}, {"url": "https://packetstormsecurity.com/files/170267/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-traceroute.php-Conditional-Command-Injection.html", "tags": ["Exploit", "Third Party Advisory"], "source": "disclosure@vulncheck.com"}, {"url": "https://www.sound4.com/", "tags": ["Product"], "source": "disclosure@vulncheck.com"}, {"url": "https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-traceroutephp", "tags": ["Third Party Advisory"], "source": "disclosure@vulncheck.com"}, {"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5740.php", "tags": ["Exploit", "Third Party Advisory"], "source": "disclosure@vulncheck.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "disclosure@vulncheck.com", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a conditional command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the traceroute.php script, which triggers the malicious file and then deletes it after execution."}], "lastModified": "2026-01-16T19:16:12.117", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C347FE-DA7B-4137-87B8-E6A8AF4D307F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A735654-A166-4B56-BF4D-F165B7E11043"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C4CF02A-8CF1-46FF-9EC0-FF779D60B6EA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EC9BD81B-573A-4DA7-AC47-6C8AF1B6B18F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18E34118-F11B-4BF2-BE23-7DAE0A6790FB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C46BF88C-955C-4F9E-B782-1EADA068F19D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0699DEA-9CDA-4BB4-8FA3-6A6FADE1A61E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "051868AE-E364-4CB3-B927-42B4E0C19D01"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBDECDEC-C5A2-4B0D-B3E0-58CCCC804BCF"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4EF10967-A7DC-4DF0-94BE-935FFC1888D6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "713CC97E-CC0A-41B8-B8CA-EAD8F774F77C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C4034A51-85E1-44E7-973B-7BFFFB083832"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ED99BE5-4598-4D5C-B0F0-3BE6E5B05C10"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B4B0A611-C50E-4397-ACDF-8D090D4AFC88"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A3C132F-ACCE-4618-8EC2-31624571F0BF"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71E155FD-162E-4EA9-9BD9-89384B3AD175"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF4C955-E4AF-4A3A-89F9-481CE5DB7BF1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "404A1397-CD88-4CB5-99B9-B84F3359E13F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45230C2E-D043-45F5-869F-FEB0A3AEB5DE"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8C68C1DC-EC1C-445B-B78C-6E4B64BB5DB0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFFD1447-69A1-4FA0-B285-6F16D9113558"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05D5318D-BD08-4D8E-9D94-4D0FD0C0023E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ED8E14DD-2C04-4080-AAE9-6D770436AC6C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "disclosure@vulncheck.com"}