CVE-2026-33000
Ubiquiti · UniFi OS
An improper input validation vulnerability in Ubiquiti UniFi OS allows high-privileged, network-adjacent users to execute arbitrary system commands.
Executive summary
A high-severity command injection flaw in Ubiquiti UniFi OS allows authenticated, high-privileged users to execute arbitrary system commands.
Vulnerability
This is a command injection vulnerability requiring a high-privileged, authenticated user on the network. The flaw arises from inadequate input validation, which allows the execution of arbitrary commands when supplied through specific system interfaces.
Business impact
With a CVSS score of 9.1, this vulnerability poses a significant risk to internal security by facilitating privilege escalation or lateral movement. Even though it requires high privileges, the potential for a compromised administrative account to gain full control of the underlying OS remains a severe threat to business continuity.
Remediation
Immediate Action: Update all UniFi OS devices to the latest firmware to sanitize input handling processes.
Proactive Monitoring: Audit administrative activity and review command logs for suspicious use of system utilities.
Compensating Controls: Enforce the principle of least privilege for all administrative users and implement multi-factor authentication (MFA) to prevent account compromise.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Organizations should treat this as a high-priority update. Limiting the number of users with administrative access and ensuring those accounts are protected by strong authentication will significantly reduce the risk surface.