Php Command Injection (CVE-2026-27175)
CVE-2026-27175
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double qu...
Overview
A critical security vulnerability has been discovered in MajorDoMo (Major Domestic Module), a popular smart home automation platform. This flaw allows an unauthenticated attacker to execute arbitrary operating system commands on the server hosting the software, effectively granting them full control over the system.
Vulnerability Details
The vulnerability is an unauthenticated command injection flaw. It exists because user input is not properly sanitized before being used in a system command. Specifically:
- An attacker can send a malicious command through a specific web endpoint (
rc/index.php). - This command is placed into a database queue.
- A separate, publicly accessible script (
cycle_execs.php) retrieves commands from this queue and executes them on the operating system without any security checks. - By exploiting a timing condition, an attacker can ensure their malicious command is executed almost immediately, typically within one second.
Impact
The impact of this vulnerability is severe. A successful exploit allows an attacker to:
- Gain complete remote control of the underlying server.
- Install malware, ransomware, or cryptocurrency miners.
- Steal sensitive data, including smart home device credentials and network information.
- Use the compromised server to attack other devices on the local network.
- Permanently damage or disable the MajorDoMo system and server.
Given that no authentication is required, any internet-facing MajorDoMo instance is at immediate risk.
Remediation and Mitigation
Immediate Action Required:
- Update Immediately: Check with the MajorDoMo project for an official security patch addressing CVE-2026-27175. Apply it as soon as it is released.
- Restrict Network Access: If an update is not immediately available, restrict access to your MajorDoMo instance. Do not expose it directly to the internet. Place it behind a firewall or VPN, ensuring it is only accessible from trusted internal networks.
- Monitor for Compromise: Review server logs for unusual activity, particularly connections to
rc/index.phpandcycle_execs.php. Monitor for unexpected processes, new user accounts, or unfamiliar network connections.
Long-term Security Practices:
- Subscribe to security announcements from the MajorDoMo project.
- Regularly update all software components.
- Run the MajorDoMo service with the minimum necessary system privileges, not as a root or administrator user.
If you suspect your system has been compromised, you should consider it fully untrusted. Begin incident response procedures, which may include restoring from a known-clean backup after applying the necessary security patches.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Metasploit Modules
Weaponized exploit code — authorized use only
The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.
Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.
| Module | Source |
|---|---|
exploit/multi/http/majordomo_cmd_injection_rce | View source |
1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.
Related Advisories
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function....
FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files c...
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their...
WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract(...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...