๐Ÿ” CVE Alert

CVE-2026-4170

CRITICAL 9.8

Topsec TopACM HTTP Request nmc_sync.php os command injection

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument template_path can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-78 CWE-77
Vendor topsec
Product topacm
Published Mar 15, 2026
Last Updated Mar 16, 2026
Stay Ahead of the Next One

Get instant alerts for topsec topacm

Be the first to know when new critical vulnerabilities affecting topsec topacm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Topsec / TopACM
3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.351077 vuldb.com: https://vuldb.com/?ctiid.351077 vuldb.com: https://vuldb.com/?submit.769768 my.feishu.cn: https://my.feishu.cn/docx/EAFFdhzoeodDxfxeazNcxBzCnRf?from=from_copylink

Credits

๐Ÿ” 0menc (VulDB User) VulDB