PatchSiren cyber security CVE debrief
CVE-2016-10043 Mrf CVE debrief
CVE-2016-10043 is a critical OS command injection flaw in Radisys MRF Web Panel (SWMS) 9.0.1. The MSM_MACRO_NAME POST parameter in /swms/ms.cgi can be abused with the pipe character to inject OS commands and return command output in application responses, enabling unauthorized command execution under the application's account.
- Vendor
- Mrf
- Product
- CVE-2016-10043
- CVSS
- CRITICAL 10
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-31
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-31
- Advisory updated
- 2026-05-13
Who should care
Operators and defenders responsible for Radisys MRF Web Panel (SWMS) 9.0.1, especially internet-exposed deployments, web application owners, and teams that monitor CGI or shell-execution pathways.
Technical summary
NVD describes a CWE-78 OS command injection in /swms/ms.cgi, where the MSM_MACRO_NAME POST parameter accepts attacker-controlled input that can be extended with a pipe character to execute arbitrary operating-system commands. The vulnerable CPE is cpe:2.3:a:mrf:web_panel:9.0.1, and the CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. The supplied description also notes that malicious activity may appear to originate from the application or its owner account.
Defensive priority
Immediate. This is a network-reachable, no-authentication, high-impact command-injection issue with a CVSS 10.0 rating.
Recommended defensive actions
- Identify every deployment of SWMS 9.0.1 and isolate it until remediation is verified.
- Block or restrict access to /swms/ms.cgi at network and application controls where feasible.
- Apply the relevant vendor fix or migrate away from the vulnerable release if a fixed version is available.
- Review logs and host telemetry for signs of unexpected shell command execution or abnormal CGI activity.
- Verify that the application does not execute attacker-controlled input through the operating system and remove any unsafe command construction.
Evidence notes
The supplied NVD record lists the vulnerability as published on 2017-01-31 and last modified on 2026-05-13. It ties the issue to SWMS 9.0.1, CWE-78, and CVSS v3.0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. A third-party Exploit-DB reference is present in the source corpus, but this debrief does not rely on exploit details.
Official resources
-
CVE-2016-10043 CVE record
CVE.org
-
CVE-2016-10043 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory, VDB Entry
Publicly disclosed in NVD on 2017-01-31 and last modified there on 2026-05-13. No KEV listing is present in the supplied enrichment.