vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into the devices field of the firmware update
update action to achieve remote code execution.
Project Subscriptions
No data.
No advisories yet.
Solution
Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the devices field of the firmware update update action to achieve remote code execution. | |
| Title | Copeland XWEB and XWEB Pro OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-27T00:46:14.644Z
Reserved: 2026-02-05T16:55:52.391Z
Link: CVE-2026-20910
No data.
Status : Received
Published: 2026-02-27T01:16:17.707
Modified: 2026-02-27T01:16:17.707
Link: CVE-2026-20910
No data.
OpenCVE Enrichment
No data.