Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Home/CyberSecurity News/MajorDoMo RCE Vulnerability Exposes Servers Code Execution
CyberSecurity News

MajorDoMo RCE Vulnerability Exposes Servers Code Execution

A newly disclosed vulnerability exposes internet-facing MajorDoMo servers to unauthenticated remote code execution. The flaw stems from a broken authentication flow and unsafe dynamic PHP evaluation....

Marcus Rodriguez
Marcus Rodriguez
May 6, 2026 3 Min Read
2 0

A newly disclosed vulnerability exposes internet-facing MajorDoMo servers to unauthenticated remote code execution. The flaw stems from a broken authentication flow and unsafe dynamic PHP evaluation.

The vulnerability (CVE-2026-27174) stems from the /admin.php request flow, where improper handling of unauthorized access allows execution to continue even after a redirect, effectively bypassing access controls.

That continued execution exposes an internal AJAX console handler that passes attacker-controlled input directly into PHP’s eval() function, turning a single crafted HTTP request into full server-side code execution on exposed MajorDoMo instances.

Because MajorDoMo often manages cameras, sensors, automation routines, and other internal IoT services, successful exploitation can quickly escalate from web compromise to wider smart-environment and network exposure.

Exploitation Mechanics and Attack Chain

Exploiting this architectural oversight requires only a single, specially crafted HTTP GET request directed at the exposed administrative interface.

Full Attack Chain(source : resecurity )
Full Attack Chain(source : resecurity )

Threat actors can trigger the vulnerability by passing specific routing variables, namely selecting the internal console operation and supplying their malicious payload through the command parameter.

Even though the server returns a redirect response to the client, the backend interpreter continues to process the injected payload and executes arbitrary PHP instructions.

This grants attackers unrestricted access to the application environment, allowing them to run system-level commands, read sensitive configuration files, and establish persistent backdoor access by writing web shells to the underlying file system.

Attacker finds exposed MajorDoMo instance(source : resecurity )
Attacker finds exposed MajorDoMo instance(source : resecurity )

As reported by Resecurity, the vulnerability is already covered by a publicly available detection template in the ProjectDiscovery Nuclei repository, signaling a heightened risk of rapid exploitation against exposed smart-home systems.

Because MajorDoMo frequently serves as the central orchestration engine for IoT devices, cameras, and private automation networks, the impact of this remote code execution flaw extends far beyond the immediate web application.

Security researchers warn that a compromised host can be weaponized as a strategic foothold, enabling threat actors to intercept surveillance feeds, extract stored network credentials, and pivot laterally into deeper, better-protected segments of the internal network.

Proof of Concept (source : resecurity )
Proof of Concept (source : resecurity )

To mitigate this severe threat, administrators must urgently restrict administrative panel access to trusted internal IP addresses and deploy the platform behind a secure virtual private network or an advanced reverse proxy authentication gateway.

Organizations should proactively audit their system logs for unexpected console operations and apply the latest vendor patches to eliminate unsafe dynamic code-execution pathways permanently.

Indicators of Compromise (IoCs)

Type Indicator Details
Network HTTP GET requests to /admin.php with parameters like ajax_panel, op, and command from external or untrusted IPs.
Network Unusual outbound connections from the server hosting MajorDoMo, potentially indicating C2 or data exfiltration.
Host Suspicious child processes spawned by the web server (e.g., www-data, apache), suggesting remote command execution.
Host Unexpected PHP files, web shells, or backdoors in web-accessible or temporary directories, indicating compromise.

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Taiwan HSR Hacked: Radio Spoofing Halts High Speed

Next Post

QLNX Credential Theft Targets Developers for Supply Chain Comprom

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Prolific Russian Ransomware Member Sentenced to Group Months
May 6, 2026
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Hackers Exploit Microsoft Teams to Steal Credentials &
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us