Php RCE Vulnerability (CVE-2026-27174) [PoC]
CVE-2026-27174
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to contin...
Overview
A critical security flaw has been identified in MajorDoMo (Major Domestic Module), a popular smart home automation platform. This vulnerability allows an unauthenticated attacker to execute arbitrary code on affected systems remotely, granting them full control over the server.
Vulnerability Details
The flaw exists due to a combination of two issues in the software’s admin panel. First, a logic error allows unauthenticated requests to bypass the normal login requirement. Second, a feature called the PHP console, intended for administrators, does not verify user permissions and directly executes code supplied by an attacker.
Specifically, an attacker can send a specially crafted web request to the /admin.php page. This request tricks the system into processing commands through its administrative backend. The vulnerable code then takes attacker-controlled input from the request and passes it directly to the PHP eval() function, which executes it as code on the server.
Impact
The impact of this vulnerability is severe. An unauthenticated attacker exploiting this flaw can:
- Execute any command or PHP code on the underlying operating system.
- Install malware, create backdoors, or steal sensitive data.
- Compromise the entire server hosting MajorDoMo and potentially attack other devices on the same network.
- Disable or manipulate smart home devices connected to the system, leading to safety, security, or privacy breaches.
Given that MajorDoMo often controls physical devices like cameras, locks, and sensors, this vulnerability poses a direct risk to physical security and personal safety.
Remediation and Mitigation
Immediate action is required to protect affected systems.
Primary Solution: Apply a Patch
- Users should upgrade to a patched version of MajorDoMo as soon as the vendor releases one. Monitor the official MajorDoMo project channels for security updates.
Immediate Mitigation Steps (If a Patch is Not Yet Available):
- Restrict Access: Use a firewall or web server configuration (e.g.,
.htaccessfor Apache) to block all external internet access to the MajorDoMo admin panel (typically the/admin.phppath and the/admin/directory). Only allow access from trusted, internal IP addresses if remote administration is necessary. - Disable the Feature: If possible, disable the PHP console module. This may require manually modifying or removing the relevant files (
modules/panel.class.phpandinc_panel_ajax.php). Always back up files before modification. - Network Segmentation: Isolate the MajorDoMo server on its own dedicated network segment, separate from critical personal devices and main business networks.
General Advice:
- Do not expose smart home administration panels directly to the internet. Always use a secure VPN for remote access.
- Regularly audit your systems for unauthorized changes or new user accounts, as these may indicate a compromise.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Metasploit Modules
Weaponized exploit code — authorized use only
The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.
Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.
| Module | Source |
|---|---|
exploit/multi/http/majordomo_console_eval_rce | View source |
1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| MaxMnMl/majordomo-CVE-2026-27174-poc CVE-2026-27174 - An unauthenticated remote code execution via the admin panel's PHP console feature | ★ 0 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their...
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components...
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenti...
A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /hotel/admin/mod_amenities/index.php?view=edit. Performin...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...