CVE-2026-4170 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 16, 2026
Topsec TopACM - Command Injection
Overview
Topsec TopACM 3.0 contains a command injection caused by manipulation of the "template_path" argument in /view/systemConfig/management/nmc_sync.php HTTP Request Handler, letting remote attackers execute arbitrary OS commands, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can execute arbitrary OS commands, potentially leading to full system compromise.
Mitigation
Update to the latest version or apply vendor patches when available.
References
Social Media Activity(1 post)
š“ CVE-2026-4170 - Critical (9.8) A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument ... š https://www.thehackerwire.com/vulnerability/CVE-2026-4170/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4170
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- command_injection
- Status
- unconfirmed
- EPSS
- 15.3%
- Social Posts
- 1
CWE
- CWE-77
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H