CVE-2026-27180: MajorDoMo RCE — High Exploit Risk
CVE-2026-27180
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method...
Overview
A critical security vulnerability has been discovered in MajorDoMo (Major Domestic Module), a popular smart home automation platform. This flaw allows an unauthenticated attacker to remotely execute code and take full control of affected systems by poisoning the software’s update mechanism.
Vulnerability Description
In simple terms, the vulnerability exists because a key administrative function is accessible without any login or password. An attacker can exploit this by tricking the system into downloading its “updates” from a malicious server they control. The system does not properly verify these updates and will automatically install any files provided, including malicious scripts like webshells. This entire attack chain can be triggered with just two web requests.
Impact
The impact of this vulnerability is severe. A successful exploit allows an attacker to:
- Execute any code or commands on the server.
- Install persistent backdoors or webshells for ongoing access.
- Steal sensitive data, disrupt smart home operations, or use the compromised system to attack other devices on the network.
- Gain complete control over the MajorDoMo instance and the underlying server.
Given the low attack complexity and the lack of required privileges (unauth), this vulnerability poses a critical risk to exposed systems.
Remediation and Mitigation
1. Immediate Action (Mitigation): * Restrict Access: Immediately ensure your MajorDoMo instance is not directly accessible from the internet. Place it behind a firewall or VPN, restricting access to only trusted internal networks. * Check for Compromise: Review your web server’s document root for unfamiliar PHP files, especially in the root directory or update-related folders. Check server access and error logs for suspicious activity.
2. Permanent Fix (Remediation):
* Apply the Patch: Update MajorDoMo to the latest patched version as soon as it is released by the vendor. Monitor the official MajorDoMo project channels for the security update addressing CVE-2026-27180.
* Disable the Module (If Possible): If an immediate update is not feasible and the saverestore module is not in use, consider disabling it entirely through the application or server configuration. This should be a temporary measure until patching can be completed.
General Advice: Always maintain a regular patching schedule for all internet-facing software and operate on the principle of least privilege, ensuring services are not exposed beyond what is strictly necessary.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Metasploit Modules
Weaponized exploit code — authorized use only
The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.
Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.
| Module | Source |
|---|---|
exploit/multi/http/majordomo_supply_chain_rce | View source |
1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.
Related Advisories
Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidd...
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from ...
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remot...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...