CVE-2026-4170

| EUVD-2026-12214 CRITICAL
2026-03-15 VulDB
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
Analysis Generated
Mar 15, 2026 - 09:00 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 09:00 euvd
EUVD-2026-12214
CVE Published
Mar 15, 2026 - 07:02 nvd
CRITICAL 9.8

Description

A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument template_path can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Analysis

Critical OS command injection vulnerability in Topsec TopACM 3.0's web management interface that allows unauthenticated remote attackers to execute arbitrary system commands. A public proof-of-concept exploit is available, and the vulnerability has a CVSS score of 9.8, though no active exploitation has been confirmed in CISA's KEV catalog. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Isolate all TopACM 3.0 instances from production networks or restrict network access to trusted sources only; confirm inventory of affected systems; establish incident response readiness. Within 7 days: Deploy WAF rules or intrusion prevention signatures to block exploitation attempts on the nmc_sync.php parameter; implement enhanced monitoring and logging; assess feasibility of product replacement or emergency upgrade. …

Sign in for detailed remediation steps.

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +49
POC: +20

Share

CVE-2026-4170 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy