Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

699+ Articles
119+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-22562 — UniFi Play PowerAmp Path Traversal RCE (CVSS 9.8)
CVE-2026-22562 — UniFi Play PowerAmp Path Traversal RCE (CVSS 9.8)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-22562

CVE-2026-22562 — UniFi Play PowerAmp Path Traversal RCE (CVSS 9.8)

A critical path traversal vulnerability in UniFi Play PowerAmp and Audio Port firmware allows an attacker with network access to write arbitrary files and achieve unauthenticated remote code execution on affected devices.

Dylan H.

Security Team

April 14, 2026
6 min read

Affected Products

  • UniFi Play PowerAmp v1.0.35 and earlier
  • UniFi Play Audio Port v1.0.24 and earlier

Executive Summary

CVE-2026-22562 is a critical path traversal vulnerability (CWE-22) in the firmware of UniFi Play PowerAmp and UniFi Play Audio Port devices. A malicious actor with access to the UniFi Play network can exploit this flaw to write arbitrary files to the device filesystem, enabling unauthenticated remote code execution with no privileges required.

CVSS Score: 9.8 (Critical) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

This vulnerability was disclosed as part of Ubiquiti Security Advisory Bulletin 063 on April 13, 2026, alongside three related issues (CVE-2026-22563, CVE-2026-22564, CVE-2026-22566) affecting the same product family. All affected devices should be updated immediately.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-22562
CWECWE-22 — Path Traversal
CVSS Score9.8 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
PublishedApril 13, 2026

Affected Products

ProductAffected VersionsFixed Version
UniFi Play PowerAmpv1.0.35 and earlierv1.0.38 or later
UniFi Play Audio Portv1.0.24 and earlierv1.1.9 or later

Related Vulnerabilities (Same Advisory)

Ubiquiti Security Advisory Bulletin 063 disclosed four CVEs affecting the UniFi Play product family:

CVECVSSTypeImpact
CVE-2026-225629.8 CriticalPath Traversal → RCEArbitrary file write → code execution
CVE-2026-225639.8 CriticalCommand InjectionUnauthenticated OS command execution
CVE-2026-22564MediumImproper Access ControlSSH enablement without authorization
CVE-2026-22566MediumImproper Access ControlWi-Fi credential theft

The combination of CVE-2026-22562 and CVE-2026-22563 gives an unauthenticated attacker full device compromise capability.


Technical Analysis

Root Cause

The vulnerability exists in the firmware's file handling routines. Attacker-controlled input is used to construct file paths without adequate sanitization or normalization. By supplying path traversal sequences (e.g., ../../../), an attacker on the UniFi Play network can escape the intended directory context and write files to arbitrary locations on the device filesystem.

Attack Chain

Once arbitrary file write is achieved, several paths to remote code execution are available:

  1. Startup script injection — Write a malicious script to an auto-executed location (init.d, cron, rc.local)
  2. Binary replacement — Overwrite a system binary or service executable with a malicious version
  3. Configuration tampering — Modify device configuration files to alter service behavior or enable backdoor access

Because the device runs firmware on embedded hardware, file writes that survive a reboot can achieve persistent compromise.

Network Requirement

Exploitation requires the attacker to have network access to the UniFi Play network segment where the device is deployed. This is typically a local Wi-Fi or LAN segment, not the wider internet — however, in improperly segmented networks (e.g., flat IoT networks, shared office networks, or networks with a compromised device already present), this access level is commonly achievable.

Exploitation Status

No public proof-of-concept exploit code had been released at the time of this advisory. The CVSS score and access requirements suggest moderate exploitation difficulty, though the lack of authentication requirements makes the vulnerability highly attractive for opportunistic attackers once a PoC becomes available.


Impact Assessment

Impact AreaDescription
Remote Code ExecutionFull code execution on the device as root/privileged user
Device TakeoverComplete control of UniFi Play device
Network PivotCompromised device can be used to pivot into the local network
Credential TheftCVE-2026-22566 (same advisory) allows Wi-Fi credential extraction
PersistenceFile writes to startup locations survive device reboots
No Authentication RequiredAny attacker on the network segment is a potential threat actor

Remediation

Immediate: Update Firmware

Apply the fixed firmware versions via the UniFi controller or UniFi mobile app:

DeviceUpdate To
UniFi Play PowerAmpv1.0.38 or later
UniFi Play Audio Portv1.1.9 or later
# Verify installed firmware version via UniFi Network Application
# Navigate to: Devices → [Device Name] → Settings → Firmware
 
# Alternatively, check from SSH (if enabled):
cat /etc/board.info | grep -i version

Network Segmentation

Isolate IoT/audio devices from general corporate or guest networks:

Recommended network topology:
  ├── Corporate LAN (VLAN 10) — workstations, servers
  ├── IoT/AV Network (VLAN 20) — UniFi Play, AV equipment
  │   └── Blocked: IoT → Corporate LAN
  │   └── Blocked: IoT → Internet (unless required)
  └── Guest Network (VLAN 30) — visitor Wi-Fi
      └── Blocked: Guest → IoT, Guest → Corporate

Proper VLAN segmentation means that even if a device is compromised, the blast radius is limited to the IoT segment.

Disable Unused Services

If SSH access is enabled on affected devices, disable it until the firmware is updated (relevant to CVE-2026-22564 in the same advisory):

# Check if SSH is enabled on the device
# Via UniFi Network Application: Devices → [Device] → Settings → Advanced → SSH

Detection

Monitor for signs of exploitation or post-compromise activity:

IndicatorDescription
Unexpected outbound connections from UniFi Play devicesPotential C2 or exfiltration
SSH enabled on devices where it was previously disabledCVE-2026-22564 exploitation
New files in system directories with unusual timestampsFile write exploitation
Device configuration changes without admin actionTampering indicator
Unusual processes running on devicePost-exploitation activity
# Check for unexpected network connections from UniFi Play devices
# Monitor via Wireshark, pfSense firewall logs, or UniFi network insights
 
# UniFi Network Application: Insights → Client → Filter by UniFi Play devices
# Look for: unexpected destinations, large data transfers, non-standard ports

References

  • NVD — CVE-2026-22562
  • Ubiquiti Security Advisory Bulletin 063
  • Related — CVE-2026-22563 (Command Injection, CVSS 9.8)
#CVE-2026-22562#Ubiquiti#UniFi#Path Traversal#RCE#Remote Code Execution#Firmware#IoT

Related Articles

CVE-2026-6057: FalkorDB Browser Unauthenticated Path Traversal RCE

FalkorDB Browser 1.9.3 contains a critical unauthenticated path traversal vulnerability in its file upload API that allows remote attackers to write...

6 min read

CVE-2026-4149: Sonos Era 300 Unauthenticated RCE via SMB Out-Of-Bounds Access

A CVSS 10 critical vulnerability in the Sonos Era 300 smart speaker allows unauthenticated remote attackers to execute arbitrary code by exploiting an...

7 min read

CVE-2025-15379: MLflow Command Injection in Model Serving (CVSS 10.0)

A maximum-severity command injection vulnerability in MLflow's model serving container initialization allows attackers to execute arbitrary OS commands...

6 min read
Back to all Security Alerts