Critical (9.8)

Php Command Injection (CVE-2026-27175)

CVE-2026-27175

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double qu...

Affected: PHP

Overview

A critical security vulnerability has been discovered in MajorDoMo (Major Domestic Module), a popular smart home automation platform. This flaw allows an unauthenticated attacker to execute arbitrary operating system commands on the server hosting the software, effectively granting them full control over the system.

Vulnerability Details

The vulnerability is an unauthenticated command injection flaw. It exists because user input is not properly sanitized before being used in a system command. Specifically:

  1. An attacker can send a malicious command through a specific web endpoint (rc/index.php).
  2. This command is placed into a database queue.
  3. A separate, publicly accessible script (cycle_execs.php) retrieves commands from this queue and executes them on the operating system without any security checks.
  4. By exploiting a timing condition, an attacker can ensure their malicious command is executed almost immediately, typically within one second.

Impact

The impact of this vulnerability is severe. A successful exploit allows an attacker to:

  • Gain complete remote control of the underlying server.
  • Install malware, ransomware, or cryptocurrency miners.
  • Steal sensitive data, including smart home device credentials and network information.
  • Use the compromised server to attack other devices on the local network.
  • Permanently damage or disable the MajorDoMo system and server.

Given that no authentication is required, any internet-facing MajorDoMo instance is at immediate risk.

Remediation and Mitigation

Immediate Action Required:

  1. Update Immediately: Check with the MajorDoMo project for an official security patch addressing CVE-2026-27175. Apply it as soon as it is released.
  2. Restrict Network Access: If an update is not immediately available, restrict access to your MajorDoMo instance. Do not expose it directly to the internet. Place it behind a firewall or VPN, ensuring it is only accessible from trusted internal networks.
  3. Monitor for Compromise: Review server logs for unusual activity, particularly connections to rc/index.php and cycle_execs.php. Monitor for unexpected processes, new user accounts, or unfamiliar network connections.

Long-term Security Practices:

  • Subscribe to security announcements from the MajorDoMo project.
  • Regularly update all software components.
  • Run the MajorDoMo service with the minimum necessary system privileges, not as a root or administrator user.

If you suspect your system has been compromised, you should consider it fully untrusted. Begin incident response procedures, which may include restoring from a known-clean backup after applying the necessary security patches.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Metasploit Modules

Weaponized exploit code — authorized use only

The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.

Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.

Module Source
exploit/multi/http/majordomo_cmd_injection_rce View source

1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.

Related Advisories

Other PHP Vulnerabilities

View all PHP vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.