Critical (9.8)

Php RCE Vulnerability (CVE-2026-27174) [PoC]

CVE-2026-27174

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to contin...

Affected: PHP

Overview

A critical security flaw has been identified in MajorDoMo (Major Domestic Module), a popular smart home automation platform. This vulnerability allows an unauthenticated attacker to execute arbitrary code on affected systems remotely, granting them full control over the server.

Vulnerability Details

The flaw exists due to a combination of two issues in the software’s admin panel. First, a logic error allows unauthenticated requests to bypass the normal login requirement. Second, a feature called the PHP console, intended for administrators, does not verify user permissions and directly executes code supplied by an attacker.

Specifically, an attacker can send a specially crafted web request to the /admin.php page. This request tricks the system into processing commands through its administrative backend. The vulnerable code then takes attacker-controlled input from the request and passes it directly to the PHP eval() function, which executes it as code on the server.

Impact

The impact of this vulnerability is severe. An unauthenticated attacker exploiting this flaw can:

  • Execute any command or PHP code on the underlying operating system.
  • Install malware, create backdoors, or steal sensitive data.
  • Compromise the entire server hosting MajorDoMo and potentially attack other devices on the same network.
  • Disable or manipulate smart home devices connected to the system, leading to safety, security, or privacy breaches.

Given that MajorDoMo often controls physical devices like cameras, locks, and sensors, this vulnerability poses a direct risk to physical security and personal safety.

Remediation and Mitigation

Immediate action is required to protect affected systems.

Primary Solution: Apply a Patch

  • Users should upgrade to a patched version of MajorDoMo as soon as the vendor releases one. Monitor the official MajorDoMo project channels for security updates.

Immediate Mitigation Steps (If a Patch is Not Yet Available):

  1. Restrict Access: Use a firewall or web server configuration (e.g., .htaccess for Apache) to block all external internet access to the MajorDoMo admin panel (typically the /admin.php path and the /admin/ directory). Only allow access from trusted, internal IP addresses if remote administration is necessary.
  2. Disable the Feature: If possible, disable the PHP console module. This may require manually modifying or removing the relevant files (modules/panel.class.php and inc_panel_ajax.php). Always back up files before modification.
  3. Network Segmentation: Isolate the MajorDoMo server on its own dedicated network segment, separate from critical personal devices and main business networks.

General Advice:

  • Do not expose smart home administration panels directly to the internet. Always use a secure VPN for remote access.
  • Regularly audit your systems for unauthorized changes or new user accounts, as these may indicate a compromise.
Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Metasploit Modules

Weaponized exploit code — authorized use only

The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.

Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.

Module Source
exploit/multi/http/majordomo_console_eval_rce View source

1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
MaxMnMl/majordomo-CVE-2026-27174-poc

CVE-2026-27174 - An unauthenticated remote code execution via the admin panel's PHP console feature

★ 0

Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Other PHP Vulnerabilities

View all PHP vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.