Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-28775: Unauthenticated Root RCE in IDC SFX
CVE-2026-28775: Unauthenticated Root RCE in IDC SFX

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-28775

CVE-2026-28775: Unauthenticated Root RCE in IDC SFX

A critical unauthenticated RCE vulnerability in International Datacasting Corporation's SFX Series satellite receivers allows attackers to execute...

Dylan H.

Security Team

March 4, 2026
5 min read

Affected Products

  • IDC SFX Series SuperFlex Satellite Receiver v101

Root-Level RCE on Satellite Receivers — No Authentication Required

International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receivers are affected by a critical unauthenticated remote code execution vulnerability tracked as CVE-2026-28775, published to the National Vulnerability Database (NVD) on March 4, 2026.

The flaw stems from an insecure default: the device provisions the private SNMP community string with read/write access out of the box. Because the underlying SNMP agent runs as root, any unauthenticated attacker with network access to port 161/UDP can abuse NET-SNMP-EXTEND-MIB directives to execute arbitrary operating system commands with full root privileges — no credentials, no user interaction required.

This is part of a broader cluster of vulnerabilities (CVE-2026-28771 through CVE-2026-28778) affecting the same IDC SFX product line, including multiple OS command injection and cross-site scripting flaws.


Vulnerability Details

DetailValue
CVE IDCVE-2026-28775
CWECWE-1188 — Insecure Default Initialization of Resource
CVSS ScorePending (network-accessible, no auth, high impact)
Attack VectorNetwork — unauthenticated, no user interaction
ImpactArbitrary OS command execution as root
Affected ProductIDC SFX Series SuperFlex Satellite Receiver v101
VendorInternational Datacasting Corporation (IDC)
PublishedMarch 4, 2026
Patch AvailableNot yet confirmed
Exploited in WildNot yet reported

How the Vulnerability Works

Step 1: Default SNMP Community String

IDC SFX Series devices ship with the SNMP private community string configured with read/write access by default. This is a well-known insecure default that is trivially guessable or discoverable via scanning tools.

Step 2: SNMP Agent Running as Root

The SNMP service on the device runs with root-level privileges. This means any action taken through the SNMP service inherits the highest privilege level on the system.

Step 3: NET-SNMP-EXTEND-MIB Abuse

The device runs a vulnerable version of net-snmp prior to 5.8. This version supports the NET-SNMP-EXTEND-MIB, which allows administrators to define custom scripts executable via SNMP queries. An attacker abuses this legitimate feature to register and execute arbitrary OS commands:

snmpset -v2c -c private <target_ip> NET-SNMP-EXTEND-MIB::nsExtendCommand.\"cmd\" s \"/bin/sh\"
snmpset -v2c -c private <target_ip> NET-SNMP-EXTEND-MIB::nsExtendArgs.\"cmd\" s \"-c 'id'\"
snmpget -v2c -c private <target_ip> NET-SNMP-EXTEND-MIB::nsExtendOutput1Line.\"cmd\"

The result is unauthenticated root-level command execution on the satellite receiver.


Related CVE Cluster (IDC SFX Series)

The IDC SFX product line was disclosed with multiple vulnerabilities simultaneously:

CVETypeComponent
CVE-2026-28771Cross-Site Scripting (XSS)Web Management Interface
CVE-2026-28772Cross-Site Scripting (XSS)Web Management Interface
CVE-2026-28773OS Command InjectionWeb Management Interface
CVE-2026-28774OS Command InjectionWeb Management Interface
CVE-2026-28775SNMP RCE (Insecure Default)SNMP Service
CVE-2026-28778Hard-coded CredentialsIDC SFX2100

The cluster suggests a security audit or independent research disclosure rather than a single targeted discovery.


Impact Assessment

Impact AreaDescription
Affected devicesIDC SFX Series SuperFlex Satellite Receivers running v101
Privilege levelFull root compromise of the device OS
Network exposureAny device with SNMP port 161/UDP accessible from untrusted networks
Sector riskBroadcast media, satellite communications, critical infrastructure
Lateral movementA compromised receiver on a managed network could serve as a pivot point
Supply chainIDC receivers are used in broadcast distribution networks globally

Recommendations

For Network Administrators

  1. Change the default SNMP community string immediately — replace private with a strong, unique string or disable SNMP write access entirely
  2. Firewall SNMP port 161/UDP — restrict access to trusted management hosts only; SNMP should never be internet-facing
  3. Disable SNMP if not required — if SNMP management is not actively used, disable the service on the device
  4. Audit all IDC SFX devices on your network for default configurations

For Security Teams

  1. Scan for CVE-2026-28775 in vulnerability management platforms once signatures are available
  2. Check for exposure — identify any IDC SFX receivers with SNMP accessible from untrusted VLANs or the internet
  3. Review the full CVE cluster (CVE-2026-28771 through CVE-2026-28778) — web management interface vulnerabilities should also be addressed
  4. Monitor for vendor patch — IDC has not yet confirmed a patched firmware version; watch for updates

Key Takeaways

  1. CVE-2026-28775 enables unauthenticated root RCE through a trivially-exploitable default SNMP community string — no credentials needed
  2. The SNMP agent running as root transforms a misconfiguration into a complete device compromise
  3. Six CVEs were disclosed simultaneously across the IDC SFX product line, suggesting the devices have not been subject to regular security review
  4. Satellite and broadcast receivers are often overlooked in enterprise and infrastructure security programs despite their network connectivity
  5. No patch is confirmed — mitigation is entirely configuration-dependent until IDC releases updated firmware
  6. CWE-1188 (insecure defaults) is a recurring class of vulnerability in embedded and IoT devices that continues to affect operational technology environments

Sources

  • CVE-2026-28775 — NVD
  • CVE-2026-28775 — OffSeq Threat Radar
  • CVE-2026-28775 — CIRCL Vulnerability Lookup
  • CVE-2026-28775 — THREATINT
#Vulnerability#CVE#RCE#SNMP#Satellite#Critical Infrastructure#NVD

Related Articles

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read

CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

A critical unauthenticated remote code execution vulnerability (CVSS 9.8) in Oracle's Edge Cloud Infrastructure Designer and Visualisation Toolkit allows...

6 min read

CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)

A critical vulnerability in Gematik Authenticator prior to version 4.16.0 allows attackers to hijack authentication sessions via malicious deep links, potentially authenticating as victim users without their credentials.

5 min read
Back to all Security Alerts