Critical (9.8)

CVE-2026-27180: MajorDoMo RCE — High Exploit Risk

CVE-2026-27180

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method...

Overview

A critical security vulnerability has been discovered in MajorDoMo (Major Domestic Module), a popular smart home automation platform. This flaw allows an unauthenticated attacker to remotely execute code and take full control of affected systems by poisoning the software’s update mechanism.

Vulnerability Description

In simple terms, the vulnerability exists because a key administrative function is accessible without any login or password. An attacker can exploit this by tricking the system into downloading its “updates” from a malicious server they control. The system does not properly verify these updates and will automatically install any files provided, including malicious scripts like webshells. This entire attack chain can be triggered with just two web requests.

Impact

The impact of this vulnerability is severe. A successful exploit allows an attacker to:

  • Execute any code or commands on the server.
  • Install persistent backdoors or webshells for ongoing access.
  • Steal sensitive data, disrupt smart home operations, or use the compromised system to attack other devices on the network.
  • Gain complete control over the MajorDoMo instance and the underlying server.

Given the low attack complexity and the lack of required privileges (unauth), this vulnerability poses a critical risk to exposed systems.

Remediation and Mitigation

1. Immediate Action (Mitigation): * Restrict Access: Immediately ensure your MajorDoMo instance is not directly accessible from the internet. Place it behind a firewall or VPN, restricting access to only trusted internal networks. * Check for Compromise: Review your web server’s document root for unfamiliar PHP files, especially in the root directory or update-related folders. Check server access and error logs for suspicious activity.

2. Permanent Fix (Remediation): * Apply the Patch: Update MajorDoMo to the latest patched version as soon as it is released by the vendor. Monitor the official MajorDoMo project channels for the security update addressing CVE-2026-27180. * Disable the Module (If Possible): If an immediate update is not feasible and the saverestore module is not in use, consider disabling it entirely through the application or server configuration. This should be a temporary measure until patching can be completed.

General Advice: Always maintain a regular patching schedule for all internet-facing software and operate on the principle of least privilege, ensuring services are not exposed beyond what is strictly necessary.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Metasploit Modules

Weaponized exploit code — authorized use only

The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.

Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.

Module Source
exploit/multi/http/majordomo_supply_chain_rce View source

1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.