Dingcheng G10 unauthenticated RCE (CVE-2026-2686)
CVE-2026-2686
Unauthenticated OS command injection in /cgi-bin/session_login.cgi lets attackers execute arbitrary commands. Update to a patched version immediately.
Patch now - CVE-2026-2686 is a critical OS command injection in SECCN Dingcheng G10 version 3.1.0.181203 that grants remote, unauthenticated attackers full device control and the ability to execute arbitrary commands. Public exploit disclosure elevates urgency for immediate remediation.
Security Advisory: Critical Command Injection Vulnerability in SECCN Dingcheng G10
Overview
A critical security flaw has been identified in SECCN Dingcheng G10 version 3.1.0.181203. The vulnerability exists in a specific web function (qq) within the /cgi-bin/session_login.cgi file. By manipulating the “User” argument, an attacker can inject and execute arbitrary operating system commands on the underlying device. This vulnerability is remotely exploitable, meaning an attacker can launch an attack over a network without needing prior access to the system.
Vulnerability Details
This is a classic OS Command Injection vulnerability. In simple terms, the affected software does not properly validate or sanitize user-supplied input (the “User” parameter) before using it to construct a system command. An attacker can craft a malicious input string that “breaks out” of the intended command and appends their own commands. Because the exploit has been publicly disclosed, attackers have access to the methodology, increasing the immediate risk of exploitation.
Impact
The impact of successful exploitation is severe, with a CVSS score of 9.8 (Critical). An attacker could:
- Gain complete control over the affected device.
- Install malware, ransomware, or other malicious software.
- Steal, modify, or delete sensitive data.
- Use the compromised device as a foothold to attack other systems on the network.
- Disrupt normal operations or render the device inoperable.
Affected Products
- SECCN Dingcheng G10, specifically version 3.1.0.181203. Other versions may also be affected and should be verified.
Remediation and Mitigation
Primary Action: Patch or Update
- Immediately contact the vendor (SECCN) to inquire about an official security patch or a fixed version of the software. Apply any available update as soon as possible after testing in your environment.
Interim Mitigations (If a Patch is Not Available):
- Network Isolation: Restrict network access to the affected device. Use firewall rules to limit inbound connections to only trusted, necessary IP addresses. If possible, place the device on a segregated network segment.
- Monitor for Exploitation: Review logs from firewalls, intrusion detection systems (IDS), and the device itself for any suspicious outbound connections or unusual command-line activity originating from the device’s IP address.
- Principle of Least Privilege: Ensure the service account running the
session_login.cgiprocess has the minimum system privileges required, to limit the potential damage of a successful attack.
General Security Practice: Do not expose the administrative interface of this device directly to the internet. Always place such devices behind a VPN or other secure access gateway.
Given the public disclosure and critical nature of this flaw, affected organizations should treat remediation as an urgent priority.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing a...
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js...
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js...
Improper neutralization of special elements used in a command ('command injection') in Azure Cloud Shell allows an unauthorized attacker to perform spoofing over a network....