SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains a conditional command injection vulnerability that allows local authenticated users to create malicious files in the /tmp directory. Unauthenticated attackers can execute commands by making a single HTTP POST request to the vulnerable ping.php script, which triggers the malicious file and then deletes it.
References
| Link | Resource |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/247915 | Third Party Advisory |
| https://packetstormsecurity.com/files/170262/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-ping.php-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
| https://www.sound4.com/ | Product |
| https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-pingphp | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5735.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
|
History
16 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
13 Jan 2026, 14:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:* cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:* cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:* cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:* cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:* cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:* cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:* cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:* |
|
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/247915 - Third Party Advisory | |
| References | () https://packetstormsecurity.com/files/170262/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-ping.php-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.sound4.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-conditional-command-injection-via-pingphp - Third Party Advisory | |
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5735.php - Exploit, Third Party Advisory | |
| First Time |
Sound4
Sound4 impact Eco Sound4 pulse Firmware Sound4 first Firmware Sound4 wm2 Sound4 impact Sound4 big Voice4 Sound4 big Voice2 Firmware Sound4 pulse Sound4 big Voice2 Sound4 big Voice4 Firmware Sound4 pulse Eco Sound4 impact Eco Firmware Sound4 impact Firmware Sound4 stream Extension Sound4 wm2 Firmware Sound4 pulse Eco Firmware Sound4 first |
30 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 23:15
Updated : 2026-01-16 19:16
NVD link : CVE-2022-50791
Mitre link : CVE-2022-50791
CVE.ORG link : CVE-2022-50791
JSON object : View
Products Affected
sound4
- impact_eco
- stream_extension
- impact_firmware
- first_firmware
- pulse_eco_firmware
- wm2_firmware
- big_voice2
- big_voice4_firmware
- impact_eco_firmware
- impact
- big_voice2_firmware
- pulse
- first
- pulse_firmware
- wm2
- pulse_eco
- big_voice4
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
