CERT Advisories

Unrestricted File Upload Vulnerability Discovered in Airleader Master Compressor Controller

2 min readSource: INCIBE-CERT

INCIBE-CERT warns of a critical unrestricted file upload flaw in Airleader Master, allowing attackers to execute arbitrary code on industrial systems.

Critical Unrestricted File Upload Flaw in Airleader Master Identified by INCIBE-CERT

Madrid, Spain – February 13, 2026 – INCIBE-CERT has issued an alert regarding a severe unrestricted file upload vulnerability in Airleader Master, a compressor controller widely used in industrial environments. The flaw, if exploited, could enable threat actors to upload malicious files and execute arbitrary code on affected systems.

Technical Details

The vulnerability stems from insufficient validation of file uploads in the Airleader Master software. Attackers with network access to the device could exploit this weakness to upload and execute unauthorized files, potentially gaining control over the compressor controller. While specific technical details remain limited, the flaw is classified as critical due to its potential impact on industrial operations.

  • Affected Product: Airleader Master (compressor controller)
  • Vulnerability Type: Unrestricted file upload
  • Potential Impact: Remote code execution (RCE), unauthorized system access
  • Disclosure Source: INCIBE-CERT (Spanish National Cybersecurity Institute)

Impact Analysis

Industrial control systems (ICS) like Airleader Master are critical to manufacturing, energy, and other sectors. A successful exploit of this vulnerability could lead to:

  • Operational disruption: Unauthorized changes to compressor settings or shutdowns.
  • Data exfiltration: Theft of sensitive operational data or intellectual property.
  • Lateral movement: Attackers could pivot to other systems within the industrial network.

Given the widespread use of Airleader Master in industrial environments, organizations are urged to assess their exposure and apply mitigations promptly.

Recommendations for Security Teams

INCIBE-CERT advises the following actions to mitigate risk:

  1. Restrict network access: Limit exposure of Airleader Master devices to trusted networks only.
  2. Apply vendor patches: Monitor Airleader’s official channels for security updates and apply them immediately.
  3. Implement network segmentation: Isolate industrial control systems from corporate networks to reduce attack surfaces.
  4. Monitor for suspicious activity: Deploy intrusion detection/prevention systems (IDS/IPS) to detect unusual file uploads or network traffic.
  5. Review access controls: Ensure only authorized personnel can interact with Airleader Master devices.

For further details, refer to the INCIBE-CERT advisory.

This is a developing story. Updates will be provided as more information becomes available.

Share