CVE-2026-4170 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 16, 2026
Topsec TopACM - Command Injection
Overview
Topsec TopACM 3.0 contains a command injection caused by manipulation of the "template_path" argument in /view/systemConfig/management/nmc_sync.php HTTP Request Handler, letting remote attackers execute OS commands, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can execute arbitrary OS commands, potentially leading to full system compromise.
Mitigation
Update to the latest version or apply vendor patches when available.
References
Social Media Activity(2 posts)
🔴 CRITICAL: CVE-2026-4170 in Topsec TopACM 3.0 enables unauthenticated OS command injection via 'template_path' in /nmc_sync.php. No patch, public exploit out. Restrict access, deploy WAF/IDS, monitor logs urgently! https://radar.offseq.com/threat/cve-2026-4170-os-command-injection-in-topsec-topac-9e1efe11 #OffSeq #vuln #cybersecurity
View original post🔴 CRITICAL: CVE-2026-4170 in Topsec TopACM 3.0 enables unauthenticated OS command injection via 'template_path' in /nmc_sync.php. No patch, public exploit out. Restrict access, deploy WAF/IDS, monitor logs urgently! https://radar.offseq.com/threat/cve-2026-4170-os-command-injection-in-topsec-topac-9e1efe11 #OffSeq #vuln #cybersecurity
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4170
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- command_injection
- Status
- unconfirmed
- EPSS
- 15.3%
- Social Posts
- 2
CWE
- CWE-77
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H