CVE-2026-2533

7.3 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Tosei Self-service Washing Machine software version 4.02. Attackers can remotely execute arbitrary commands by manipulating the adr_txt_1 parameter in the tosei_datasend.php file. Organizations using these self-service washing machines with the vulnerable software are affected.

💻 Affected Systems

Products:
  • Tosei Self-service Washing Machine
Versions: 4.02
Operating Systems: Unknown - Likely embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific washing machine model with the vulnerable software version. The vulnerability is in the web interface component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the washing machine system allowing execution of arbitrary commands, potential lateral movement to other systems, and disruption of service operations.

🟠

Likely Case

Remote code execution leading to system compromise, data theft, or service disruption of the washing machine functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely and the exploit has been published, making attacks likely.
🏢 Internal Only: MEDIUM - If systems are not internet-facing but are on internal networks, risk depends on internal attacker presence and network segmentation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been published and can be executed remotely without authentication, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None - Vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Contact Tosei directly for security updates or consider alternative mitigation strategies.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate washing machine systems from internet and restrict network access to necessary services only.

Web Application Firewall

all

Deploy WAF rules to block requests containing suspicious patterns targeting the vulnerable endpoint.

🧯 If You Can't Patch

  • Disable or restrict access to the /cgi-bin/tosei_datasend.php endpoint if possible
  • Implement strict input validation and sanitization for the adr_txt_1 parameter

🔍 How to Verify

Check if Vulnerable:

Check if the system runs Tosei Self-service Washing Machine software version 4.02 and has the /cgi-bin/tosei_datasend.php endpoint accessible.

Check Version:

Check device web interface or contact vendor for version information

Verify Fix Applied:

Test if command injection is possible by attempting to inject commands through the adr_txt_1 parameter.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /cgi-bin/tosei_datasend.php with command injection patterns
  • System commands executed from web interface processes

Network Indicators:

  • HTTP requests containing shell metacharacters or command injection payloads targeting the vulnerable endpoint

SIEM Query:

source="web_logs" AND uri="/cgi-bin/tosei_datasend.php" AND (payload CONTAINS "|" OR payload CONTAINS ";" OR payload CONTAINS "`" OR payload CONTAINS "$" OR payload CONTAINS "(")

🔗 References

📤 Share & Export