INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h
Vulnerabilities

CVE-2019-25289

High
SmartLiving SmartLAN Authenticated Remote Command Injection Vulnerability (CVE-2019-25289)
CWE-78 — Weakness Type
Published: Jan 8, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.

🤖 AI Executive Summary

SmartLiving SmartLAN version 6.x and earlier contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter in the 'testemail' module. Attackers can exploit unsanitized input to execute arbitrary system commands with root privileges using default credentials. The vulnerability has a CVSS score of 8.8 (High) and poses significant risk to building automation and smart facility management systems.

📄 Description (Arabic)

تسمح هذه الثغرة الأمنية للمهاجمين المصادق عليهم بحقن أوامر نظام تشغيل عشوائية من خلال استغلال معامل 'par' غير المعقم في وحدة 'testemail' ضمن الملف الثنائي web.cgi. يتم تنفيذ الأوامر المحقونة بصلاحيات الجذر الكاملة بسبب استخدام دالة system() دون تحقق مناسب من المدخلات. يزداد خطر الاستغلال بشكل كبير عند استخدام بيانات الاعتماد الافتراضية التي لم يتم تغييرها. تؤثر الثغرة على جميع إصدارات SmartLAN حتى الإصدار 6.x وتستهدف أنظمة إدارة المباني الذكية والتحكم في المرافق.

🤖 ملخص تنفيذي (AI)

يحتوي نظام SmartLiving SmartLAN الإصدار 6.x والإصدارات الأقدم على ثغرة حقن أوامر عن بعد مصادق عليها في ملف web.cgi الثنائي من خلال معامل POST المسمى 'par' في وحدة 'testemail'. يمكن للمهاجمين استغلال المدخلات غير المعقمة لتنفيذ أوامر نظام عشوائية بصلاحيات الجذر باستخدام بيانات الاعتماد الافتراضية. تحمل الثغرة درجة خطورة 8.8 (عالية) وتشكل خطراً كبيراً على أنظمة أتمتة المباني وإدارة المرافق الذكية.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:57
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using SmartLiving SmartLAN systems in smart buildings, government facilities, and critical infrastructure face significant risk of complete system compromise. Attackers exploiting this vulnerability can gain root-level access to building automation systems, potentially disrupting HVAC, lighting, security systems, and accessing sensitive operational data, which directly impacts compliance with NCA ECC controls for IoT security and SAMA CSF requirements for operational technology protection.
🏢 Affected Saudi Sectors
إدارة المباني الذكية المرافق الحكومية القطاع المصرفي والمالي القطاع الصحي التعليم الضيافة والفنادق المراكز التجارية البنية التحتية الحيوية
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately change all default credentials on SmartLiving SmartLAN devices and implement strong password policies with multi-factor authentication where possible.
2. Implement network segmentation to isolate building automation systems from corporate networks and restrict access to the web.cgi interface using firewall rules and access control lists (ACLs) to authorized IP addresses only.
3. Deploy intrusion detection/prevention systems (IDS/IPS) to monitor for command injection attempts targeting the 'testemail' module and 'par' parameter, and contact the vendor for security patches or consider replacing affected systems if no patch is available.
🔧 خطوات المعالجة (العربية)
1. تغيير جميع بيانات الاعتماد الافتراضية فوراً على أجهزة SmartLiving SmartLAN وتطبيق سياسات كلمات مرور قوية مع المصادقة متعددة العوامل حيثما أمكن.
2. تنفيذ تجزئة الشبكة لعزل أنظمة أتمتة المباني عن الشبكات المؤسسية وتقييد الوصول إلى واجهة web.cgi باستخدام قواعد جدار الحماية وقوائم التحكم بالوصول (ACLs) لعناوين IP المصرح بها فقط.
3. نشر أنظمة كشف ومنع التسلل (IDS/IPS) لمراقبة محاولات حقن الأوامر التي تستهدف وحدة 'testemail' ومعامل 'par'، والاتصال بالمورد للحصول على تحديثات أمنية أو النظر في استبدال الأنظمة المتأثرة إذا لم يتوفر تصحيح أمني.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
NCA-ECC-1-2-1: Network Security Controls NCA-ECC-1-3-1: Access Control NCA-ECC-4-1-1: IoT and OT Security NCA-ECC-5-1-1: Vulnerability Management
🔵 SAMA CSF
SAMA-CSF-CCC-1.1: Asset Management SAMA-CSF-CCC-3.1: Access Control SAMA-CSF-CCC-5.2: Vulnerability Management SAMA-CSF-CCC-6.1: Network Security
🟡 ISO 27001:2022
A.9.2.1: User Registration and De-registration A.9.4.1: Information Access Restriction A.12.6.1: Management of Technical Vulnerabilities A.13.1.3: Segregation in Networks
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-78
EPSS0.37%
Exploit No
Patch ✓ Yes
Published 2026-01-08
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-78
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.