CVSS 8.8CVE-2026-34797CVE-2026-34794CVE-2026-34792

Endian Firewall: Perl Command Injection Vulnerabilities (CVE-2026)

Multiple command injection vulnerabilities in Endian Firewall <= 3.3.25 allow authenticated attackers to execute arbitrary OS commands. Patch now!

Published on

Multiple command injection vulnerabilities have been discovered in Endian Firewall, affecting versions 3.3.25 and prior. These vulnerabilities allow authenticated attackers to execute arbitrary operating system commands. A patch is available to address these issues.

These vulnerabilities are considered high severity, with a CVSS score of 8.8.

What is Endian Firewall?

Endian Firewall is a component for perl, designed to provide network security solutions. It typically includes features like firewalling, intrusion detection, and VPN capabilities. Due to its role in network security, vulnerabilities in Endian Firewall can have significant consequences. To learn more, search all endian-firewall CVEs.

CVE-2026-34797: Endian Firewall /cgi-bin/logs_smtp.cgi DATE Command Injection

CVSS8.8
Affected versionsEndian Firewall versions 3.3.25 and prior are affected. This vulnerability requires an authenticated user to exploit.

High severity: allows arbitrary command execution by authenticated users.

The DATE parameter in /cgi-bin/logs_smtp.cgi is vulnerable to command injection. An authenticated user can manipulate the DATE parameter to inject arbitrary OS commands due to insufficient validation in a Perl open() call.

How to fix CVE-2026-34797 in Endian Firewall

Patch immediately
  1. 1.Update the endian-firewall package to the latest version.
Update endian-firewall
composer update endian-firewall

Workaround: No known workaround is available. Apply the patch immediately.

NextGuard automatically flags CVE-2026-34797 if Endian Firewall appears in any of your monitored projects — no manual lookup required.

CVE-2026-34794: Endian Firewall /cgi-bin/logs_ids.cgi DATE Command Injection

CVSS8.8
Affected versionsEndian Firewall versions 3.3.25 and prior are affected. This vulnerability requires an authenticated user to exploit.

High severity: allows arbitrary command execution by authenticated users.

The DATE parameter in /cgi-bin/logs_ids.cgi is vulnerable to command injection. An authenticated user can manipulate the DATE parameter to inject arbitrary OS commands due to insufficient validation in a Perl open() call.

How to fix CVE-2026-34794 in Endian Firewall

Patch immediately
  1. 1.Update the endian-firewall package to the latest version.
Update endian-firewall
composer update endian-firewall

Workaround: No known workaround is available. Apply the patch immediately.

NextGuard automatically flags CVE-2026-34794 if Endian Firewall appears in any of your monitored projects — no manual lookup required.

CVE-2026-34792: Endian Firewall /cgi-bin/logs_clamav.cgi DATE Command Injection

CVSS8.8
Affected versionsEndian Firewall versions 3.3.25 and prior are affected. This vulnerability requires an authenticated user to exploit.

High severity: allows arbitrary command execution by authenticated users.

The DATE parameter in /cgi-bin/logs_clamav.cgi is vulnerable to command injection. An authenticated user can manipulate the DATE parameter to inject arbitrary OS commands due to insufficient validation in a Perl open() call.

How to fix CVE-2026-34792 in Endian Firewall

Patch immediately
  1. 1.Update the endian-firewall package to the latest version.
Update endian-firewall
composer update endian-firewall

Workaround: No known workaround is available. Apply the patch immediately.

NextGuard automatically flags CVE-2026-34792 if Endian Firewall appears in any of your monitored projects — no manual lookup required.

Stay ahead of perl vulnerabilities

Proactively detect and remediate vulnerabilities in your perl projects. Use NextGuard to monitor your perl dependencies.

Compare Plans

Frequently asked questions

Multiple command injection vulnerabilities in Endian Firewall require immediate patching. Keep your systems secure by staying informed about the latest threats and updates. see all perl vulnerabilities.

Related topics

Command InjectionPerlEndian FirewallVulnerability ManagementSecurity Patch