Endian Firewall Command Injection Vulnerability (CVE-2026-34791)
Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.
Endian Firewall version 3.3.25 and prior is susceptible to OS command injection. This vulnerability, identified as CVE-2026-34791, allows authenticated users to execute arbitrary operating system commands. The vulnerability exists due to insufficient validation of the DATE parameter in the /cgi-bin/logs_proxy.cgi script. The DATE parameter’s value is used to construct a file path that is subsequently passed to a Perl open() call. Due to an incomplete regular expression validation, an attacker can inject malicious commands. Successful exploitation allows the attacker to gain complete control of the affected system.
Attack Chain
- An authenticated user accesses the
/cgi-bin/logs_proxy.cgiendpoint. - The attacker crafts a malicious
DATEparameter containing OS commands to be injected. - The
/cgi-bin/logs_proxy.cgiscript receives theDATEparameter. - The script constructs a file path using the unvalidated
DATEparameter. - The script passes the crafted file path to a Perl
open()call. - The Perl
open()function executes the injected OS commands due to the incomplete regular expression validation. - The attacker gains arbitrary code execution on the system.
- The attacker can then perform actions such as installing malware, creating user accounts, or exfiltrating sensitive data.
Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary OS commands on the affected Endian Firewall system. This can lead to complete system compromise, including data theft, service disruption, and the potential to use the compromised system as a launchpad for further attacks within the network. Given that firewalls are critical security components, a compromise could have severe consequences for the entire network infrastructure, leading to widespread data breaches and significant financial losses.
Recommendation
- Apply available patches or upgrade to a supported version of Endian Firewall that addresses CVE-2026-34791 (refer to Endian Firewall’s advisory).
- Implement the Sigma rule
Detect Suspicious Logs Proxy Date Parameterto detect potential exploitation attempts. - Monitor web server logs for suspicious requests to
/cgi-bin/logs_proxy.cgicontaining unusual characters or command-like syntax in theDATEparameter. - Implement strong input validation and sanitization for all user-supplied input to prevent command injection attacks.
Detection coverage 2
Detect Suspicious Logs Proxy Date Parameter
criticalDetects suspicious requests to /cgi-bin/logs_proxy.cgi with potentially malicious DATE parameters indicative of command injection attempts.
Detect Perl open() Call with Unvalidated Path
highDetects Perl open() calls with paths constructed from user-supplied input, which can indicate command injection vulnerabilities.
Detection queries are kept inside the platform. Get full rules →