PatchSiren cyber security CVE debrief
CVE-2026-36827 Panabit CVE debrief
CVE-2026-36827 describes a command injection vulnerability in Panabit PAP-XM320 up to and including V7.7. The web management interface passes user-controlled parameters to the backend helper /usr/sbin/pappiw, which performs unsafe argument handling with eval. An authenticated remote attacker with access to the management interface may be able to execute arbitrary shell commands. NVD lists the issue as deferred and maps it to CWE-78.
- Vendor
- Panabit
- Product
- PAP-XM320
- CVSS
- MEDIUM 5.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-19
- Original CVE updated
- 2026-05-19
- Advisory published
- 2026-05-19
- Advisory updated
- 2026-05-19
Who should care
Administrators and security teams responsible for Panabit PAP-XM320 deployments, especially environments where the web management interface is reachable over a network and where multiple authenticated users or remote admin access exist.
Technical summary
The issue is a command injection weakness in a backend helper used by the management interface. According to the supplied description, /usr/sbin/pappiw receives attacker-influenced arguments from the web interface and processes them unsafely with eval, allowing shell metacharacters or other injected content to alter command execution. The NVD record associates the issue with CWE-78 and uses CVSS 3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network reachability, low attack complexity, and required authenticated access.
Defensive priority
Medium. The vulnerability requires authenticated access, but it is network-reachable and affects a management interface, so exposure should be reviewed promptly in any deployment that permits remote administration.
Recommended defensive actions
- Identify whether any Panabit PAP-XM320 appliances are running V7.7 or earlier.
- Restrict access to the web management interface to trusted administrative networks only.
- Review vendor or source guidance for a patched release or mitigation before exposing the interface broadly.
- Audit administrative accounts and remove or disable any unnecessary web management access.
- Monitor logs for unexpected management actions or shell activity associated with the appliance.
- If patching is unavailable, place the device behind strict network controls until a fix is confirmed.
Evidence notes
This debrief is based only on the supplied CVE record and linked references. The record was published on 2026-05-19T17:16:21.937Z and modified on 2026-05-19T19:16:50.047Z. The supplied description states that the vulnerability affects Panabit PAP-XM320 up to and including V7.7 and involves /usr/sbin/pappiw and eval-based unsafe argument processing. NVD marks the vulnerability status as Deferred and lists CWE-78 with CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N.
Official resources
Published by the source record on 2026-05-19T17:16:21.937Z; modified on 2026-05-19T19:16:50.047Z.