SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains an authenticated command injection vulnerability in the www-data-handler.php script that allows attackers to inject system commands through the 'services' POST parameter. Attackers can exploit this vulnerability by crafting malicious 'services' parameter values to execute arbitrary system commands with www-data user privileges.
References
| Link | Resource |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/247917 | Third Party Advisory |
| https://packetstormsecurity.com/files/170264/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-services-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
| https://www.sound4.com/ | Product |
| https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-authenticated-command-injection-via-www-data-handlerphp | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5737.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
|
History
13 Jan 2026, 14:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:sound4:pulse:1.0:*:*:*:*:*:*:* cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:h:sound4:first:1.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:first:2.0:*:*:*:*:*:*:* cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:* cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:* cpe:2.3:h:sound4:big_voice2:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:* cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:big_voice4:-:*:*:*:*:*:*:* cpe:2.3:h:sound4:pulse:2.0:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact:1.0:*:*:*:*:*:*:* cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:* cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:* cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:* cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:* |
|
| First Time |
Sound4
Sound4 impact Eco Sound4 pulse Firmware Sound4 first Firmware Sound4 wm2 Sound4 impact Sound4 big Voice4 Sound4 big Voice2 Firmware Sound4 pulse Sound4 big Voice2 Sound4 big Voice4 Firmware Sound4 pulse Eco Sound4 impact Eco Firmware Sound4 impact Firmware Sound4 stream Extension Sound4 wm2 Firmware Sound4 pulse Eco Firmware Sound4 first |
|
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/247917 - Third Party Advisory | |
| References | () https://packetstormsecurity.com/files/170264/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-services-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.sound4.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-authenticated-command-injection-via-www-data-handlerphp - Third Party Advisory | |
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5737.php - Exploit, Third Party Advisory |
30 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 23:15
Updated : 2026-01-13 14:36
NVD link : CVE-2022-50793
Mitre link : CVE-2022-50793
CVE.ORG link : CVE-2022-50793
JSON object : View
Products Affected
sound4
- impact_eco
- stream_extension
- impact_firmware
- first_firmware
- pulse_eco_firmware
- wm2_firmware
- big_voice2
- big_voice4_firmware
- impact_eco_firmware
- impact
- big_voice2_firmware
- pulse
- first
- pulse_firmware
- wm2
- pulse_eco
- big_voice4
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
