Search criteria
2 vulnerabilities found for PolyScope 5 by Universal Robots
CVE-2026-8153 (GCVE-0-2026-8153)
Vulnerability from nvd – Published: 2026-05-08 11:45 – Updated: 2026-05-11 09:27
VLAI?
Title
Command injection in Dashboard Server interface
Summary
OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to 5.25.1 allows unauthenticated attacker to craft commands that will execute code on the robot's OS.
Severity ?
9.8 (Critical)
CWE
- CWE-78 - Improper neutralization of special elements used in an OS command ('OS command injection')
Assigner
References
1 reference
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Universal Robots | PolyScope 5 |
Affected:
0 , < 5.25.1
(semver)
|
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8153",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-08T12:46:58.925917Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T12:47:12.421Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PolyScope 5",
"vendor": "Universal Robots",
"versions": [
{
"lessThan": "5.25.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Only applicable if Dashboard Server interface is active"
}
],
"value": "Only applicable if Dashboard Server interface is active"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Vera Mens of Claroty Team82"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u0026nbsp;5.25.1\u0026nbsp;allows unauthenticated attacker to\u0026nbsp;craft commands that will execute code on the robot\u0027s OS."
}
],
"value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u00a05.25.1\u00a0allows unauthenticated attacker to\u00a0craft commands that will execute code on the robot\u0027s OS."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper neutralization of special elements used in an OS command (\u0027OS command injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T09:27:08.778Z",
"orgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"shortName": "TRO"
},
"references": [
{
"url": "https://www.universal-robots.com/developer/communication-protocol/dashboard-server/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to version\u0026nbsp;5.25.1\u0026nbsp;or later, or disable Dashboard Server interface"
}
],
"value": "Update to version\u00a05.25.1\u00a0or later, or disable Dashboard Server interface"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Command injection in Dashboard Server interface",
"x_generator": {
"engine": "Vulnogram 1.0.2"
}
}
},
"cveMetadata": {
"assignerOrgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"assignerShortName": "TRO",
"cveId": "CVE-2026-8153",
"datePublished": "2026-05-08T11:45:18.462Z",
"dateReserved": "2026-05-08T08:20:00.514Z",
"dateUpdated": "2026-05-11T09:27:08.778Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-8153 (GCVE-0-2026-8153)
Vulnerability from cvelistv5 – Published: 2026-05-08 11:45 – Updated: 2026-05-11 09:27
VLAI?
Title
Command injection in Dashboard Server interface
Summary
OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to 5.25.1 allows unauthenticated attacker to craft commands that will execute code on the robot's OS.
Severity ?
9.8 (Critical)
CWE
- CWE-78 - Improper neutralization of special elements used in an OS command ('OS command injection')
Assigner
References
1 reference
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Universal Robots | PolyScope 5 |
Affected:
0 , < 5.25.1
(semver)
|
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8153",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-08T12:46:58.925917Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T12:47:12.421Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PolyScope 5",
"vendor": "Universal Robots",
"versions": [
{
"lessThan": "5.25.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Only applicable if Dashboard Server interface is active"
}
],
"value": "Only applicable if Dashboard Server interface is active"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Vera Mens of Claroty Team82"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u0026nbsp;5.25.1\u0026nbsp;allows unauthenticated attacker to\u0026nbsp;craft commands that will execute code on the robot\u0027s OS."
}
],
"value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u00a05.25.1\u00a0allows unauthenticated attacker to\u00a0craft commands that will execute code on the robot\u0027s OS."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper neutralization of special elements used in an OS command (\u0027OS command injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T09:27:08.778Z",
"orgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"shortName": "TRO"
},
"references": [
{
"url": "https://www.universal-robots.com/developer/communication-protocol/dashboard-server/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to version\u0026nbsp;5.25.1\u0026nbsp;or later, or disable Dashboard Server interface"
}
],
"value": "Update to version\u00a05.25.1\u00a0or later, or disable Dashboard Server interface"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Command injection in Dashboard Server interface",
"x_generator": {
"engine": "Vulnogram 1.0.2"
}
}
},
"cveMetadata": {
"assignerOrgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
"assignerShortName": "TRO",
"cveId": "CVE-2026-8153",
"datePublished": "2026-05-08T11:45:18.462Z",
"dateReserved": "2026-05-08T08:20:00.514Z",
"dateUpdated": "2026-05-11T09:27:08.778Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}