CVE-2022-50796
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Unauthenticated Remote Code Execution via upload.cgi
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains an unauthenticated remote code execution vulnerability in the firmware upload functionality with path traversal flaw. Attackers can exploit the upload.cgi script to write malicious files to the system with www-data permissions, enabling unauthorized access and code execution.
| CWE | CWE-22 |
| Vendor | sound4 ltd. |
| Product | impact/pulse/first |
| Published | Dec 30, 2025 |
| Last Updated | Feb 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for sound4 ltd. impact/pulse/first
Be the first to know when new critical vulnerabilities affecting sound4 ltd. impact/pulse/first are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
SOUND4 Ltd. / Impact/Pulse/First
Version 2: 1.1/2.15
SOUND4 Ltd. / Impact/Pulse Eco
1.16
SOUND4 Ltd. / BigVoice4
1.2
SOUND4 Ltd. / BigVoice2
1.30
SOUND4 Ltd. / Stream
1.1/2.4.29
Kantar Media / WM2
1.11
References
zeroscience.mk: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5741.php packetstormsecurity.com: https://packetstormsecurity.com/files/170268/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-upload.cgi-Code-Execution.html exchange.xforce.ibmcloud.com: https://exchange.xforce.ibmcloud.com/vulnerabilities/247951 sound4.com: https://www.sound4.com/ vulncheck.com: https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-unauthenticated-remote-code-execution-via-uploadcgi
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab