A CRITICAL-severity vulnerability identified as CVE-2026-28773 has been published on March 4, 2026 with a CVSS base score of 9.3. This security advisory provides a detailed breakdown of the vulnerability, its potential impact, weakness classification, and actionable steps to protect your systems.
Table of Contents
ToggleVulnerability Details
CVE ID: CVE-2026-28773
Severity: CRITICAL
CVSS Score: 9.3
Published: March 4, 2026
Weakness (CWE): CWE-78
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | None |
Technical Description
The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges.
Potential Impact
If exploited, this critical-severity vulnerability could allow an attacker to cause significant damage to affected systems. Organizations running affected software should treat this as a priority remediation item.
Recommended Action
No official patch is available yet. Until one is released:
- Monitor the official NVD page and vendor channels for patch announcements.
- Restrict access to the affected system or service where possible.
- Apply network-level mitigations such as firewall rules or WAF policies.
- Enable logging and alerting for anomalous activity related to this vulnerability.
- Review your incident response plan in case of active exploitation.
References
Related Security Advisories
- [HIGH] CVE-2026-26280 — CVSS 8.4 — HIGH / CVSS 8.4
- [CRITICAL] CVE-2026-22886 — CVSS 9.8 (March 3, 2026) — CRITICAL / CVSS 9.8
- [CRITICAL] CVE-2026-3010 — CVSS 9.3 (February 28, 2026) — CRITICAL / CVSS 9.3

![[HIGH] CVE-2026-0234 — CVSS 7.2 (April 13, 2026)](https://atlas-cybersecurity.com/wp-content/plugins/elementor/assets/images/placeholder.png)



