Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-10956

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-17 Jan, 2020 | 17:52
Updated At-04 Aug, 2024 | 22:40
Rejected At-
Credits

Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated user, using a specially crafted URL command, to execute commands as root.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
ā–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:17 Jan, 2020 | 17:52
Updated At:04 Aug, 2024 | 22:40
Rejected At:
ā–¼CVE Numbering Authority (CNA)

Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated user, using a specially crafted URL command, to execute commands as root.

Affected Products
Vendor
n/a
Product
Geutebruck IP Cameras
Versions
Affected
  • G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior
Problem Types
TypeCWE IDDescription
CWECWE-78IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78
Type: CWE
CWE ID: CWE-78
Description: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.us-cert.gov/ics/advisories/ICSA-19-155-03
x_refsource_MISC
Hyperlink: https://www.us-cert.gov/ics/advisories/ICSA-19-155-03
Resource:
x_refsource_MISC
ā–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.us-cert.gov/ics/advisories/ICSA-19-155-03
x_refsource_MISC
x_transferred
Hyperlink: https://www.us-cert.gov/ics/advisories/ICSA-19-155-03
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
ā–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:17 Jan, 2020 | 18:15
Updated At:24 Jan, 2020 | 22:10

Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated user, using a specially crafted URL command, to execute commands as root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.09.0HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 9.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

geutebrueck
geutebrueck
>>g-code_eec-2400>>-
cpe:2.3:h:geutebrueck:g-code_eec-2400:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-code_eec-2400_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ebc-2110>>-
cpe:2.3:h:geutebrueck:g-cam_ebc-2110:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ebc-2110_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ebc-2111>>-
cpe:2.3:h:geutebrueck:g-cam_ebc-2111:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ebc-2111_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_efd-2240>>-
cpe:2.3:h:geutebrueck:g-cam_efd-2240:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_efd-2240_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_efd-2240_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_efd-2241>>-
cpe:2.3:h:geutebrueck:g-cam_efd-2241:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_efd-2241_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_efd-2250>>-
cpe:2.3:h:geutebrueck:g-cam_efd-2250:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_efd-2250_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2230>>-
cpe:2.3:h:geutebrueck:g-cam_ethc-2230:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2230_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2240>>-
cpe:2.3:h:geutebrueck:g-cam_ethc-2240:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2240_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2239_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2239>>-
cpe:2.3:h:geutebrueck:g-cam_ethc-2239:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2249_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ethc-2249>>-
cpe:2.3:h:geutebrueck:g-cam_ethc-2249:-:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ewpc-2270_firmware>>Versions up to 1.12.0.25(inclusive)
cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*
geutebrueck
geutebrueck
>>g-cam_ewpc-2270>>-
cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE-78Secondaryics-cert@hq.dhs.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-78
Type: Secondary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.us-cert.gov/ics/advisories/ICSA-19-155-03ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
Hyperlink: https://www.us-cert.gov/ics/advisories/ICSA-19-155-03
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

1169Records found

CVE-2020-10390
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-4.70% / 89.43%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 13:03
Updated-04 Aug, 2024 | 10:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command Injection in export.php (vulnerable function called from include/functions-article.php) in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to achieve Code Execution by saving the code to be executed as the wkhtmltopdf path via admin/save-settings.php.

Action-Not Available
Vendor-chadhaajayn/a
Product-phpkbn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-10583
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-2.04% / 83.96%
||
7 Day CHG~0.00%
Published-25 Mar, 2021 | 19:47
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The /admin/admapi.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote authenticated attackers to execute arbitrary OS commands on the server as the user running the application.

Action-Not Available
Vendor-invigon/a
Product-automatic_device_managementn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-10213
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-3.41% / 87.51%
||
7 Day CHG~0.00%
Published-07 Mar, 2020 | 00:29
Updated-04 Aug, 2024 | 10:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

Action-Not Available
Vendor-n/aTRENDnet, Inc.D-Link Corporation
Product-tew-632brpdir-825_firmwaredir-825tew-632brp_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-10173
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-56.12% / 98.12%
||
7 Day CHG~0.00%
Published-05 Mar, 2020 | 14:36
Updated-04 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Comtrend VR-3033 DE11-416SSG-C01_R02.A2pvI042j1.d26m devices have Multiple Authenticated Command Injection vulnerabilities via the ping and traceroute diagnostic pages, as demonstrated by shell metacharacters in the pingIpAddress parameter to ping.cgi.

Action-Not Available
Vendor-comtrendn/a
Product-vr-3033vr-3033_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-10208
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.9||CRITICAL
EPSS-8.34% / 92.33%
||
7 Day CHG~0.00%
Published-29 Dec, 2020 | 23:41
Updated-04 Aug, 2024 | 10:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Command Injection in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows authenticated remote attackers to execute arbitrary commands with root user privileges.

Action-Not Available
Vendor-aminon/a
Product-kami7b_firmwareak45xak45x_firmwareak65xak5xx_firmwarearia7xxaria6xxaria6xx_firmwareak65x_firmwareak5xxaria7xx_firmwarekami7bn/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-10216
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-3.43% / 87.55%
||
7 Day CHG~0.00%
Published-07 Mar, 2020 | 00:29
Updated-04 Aug, 2024 | 10:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

Action-Not Available
Vendor-n/aTRENDnet, Inc.D-Link Corporation
Product-tew-632brpdir-825_firmwaredir-825tew-632brp_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-65074
Matching Score-4
Assigner-CERT.PL
ShareView Details
Matching Score-4
Assigner-CERT.PL
CVSS Score-8.6||HIGH
EPSS-0.11% / 28.46%
||
7 Day CHG~0.00%
Published-16 Dec, 2025 | 12:25
Updated-22 Dec, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection via Path Traversal in WaveStore Server

WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server.Ā A malicious attacker with high-privileges is able to execute arbitrary OS commands on the server using path traversal in theĀ showerr script. This issue was fixed in version 6.44.44

Action-Not Available
Vendor-wavestoreWaveStore
Product-video_management_software_serverWaveStore Server
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-6373
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.78% / 73.77%
||
7 Day CHG~0.00%
Published-22 Sep, 2016 | 22:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web-based GUI in Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote authenticated administrators to execute arbitrary OS commands as root via crafted platform commands, aka Bug ID CSCva00541.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-cloud_services_platform_2100n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-66052
Matching Score-4
Assigner-CERT.PL
ShareView Details
Matching Score-4
Assigner-CERT.PL
CVSS Score-8.6||HIGH
EPSS-0.31% / 54.31%
||
7 Day CHG+0.04%
Published-09 Jan, 2026 | 11:54
Updated-14 Jan, 2026 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command injection in Vivotek IP7137 cameras

Vivotek IP7137 camera with firmware version 0200a is vulnerable to command injection. Parameter "system_ntpIt" used by "/cgi-bin/admin/setparam.cgi" endpoint is not sanitized properly, allowing a user with administrative privileges to perform an attack. Due to CVE-2025-66050, administrative access is not protected by default,Ā  The vendor has not replied to the CNA Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

Action-Not Available
Vendor-vivotekVivotek
Product-ip7137_firmwareip7137IP7137
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-37730
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.2||HIGH
EPSS-3.40% / 87.50%
||
7 Day CHG~0.00%
Published-12 Oct, 2021 | 14:07
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.

Action-Not Available
Vendor-n/aSiemens AGAruba Networks
Product-aruba_instantscalance_w1750d_firmwarescalance_w1750dHPE Aruba Instant (IAP)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-64328
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-82.93% / 99.26%
||
7 Day CHG-0.57%
Published-07 Nov, 2025 | 03:32
Updated-24 Feb, 2026 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2026-02-24||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
FreePBX Administration GUI is Vulnerable to Authenticated Command Injection

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote access to the system as an asterisk user. This issue is fixed in version 17.0.3.

Action-Not Available
Vendor-SangomaSangoma Technologies Corp.FreePBX
Product-firestorefilestoreFreePBX
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-64153
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.09% / 25.26%
||
7 Day CHG-0.09%
Published-09 Dec, 2025 | 17:18
Updated-14 Jan, 2026 | 09:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.6.0 through 7.6.3, FortiExtender 7.4.0 through 7.4.7, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiextenderfortiextender_firmwareFortiExtender
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-63911
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.23% / 45.63%
||
7 Day CHG+0.01%
Published-03 Mar, 2026 | 00:00
Updated-05 Mar, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to contain an authenticated command injection vulnerability.

Action-Not Available
Vendor-n/aCohesity, Inc.
Product-tranzmann/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-5313
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-8.8||HIGH
EPSS-25.81% / 96.30%
||
7 Day CHG~0.00%
Published-12 Apr, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Web Gateway (SWG) before 5.2.5 allows remote authenticated users to execute arbitrary OS commands.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-web_gatewayn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-5679
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-15.46% / 94.71%
||
7 Day CHG~0.00%
Published-31 Aug, 2016 | 15:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cgi-bin/cgi_main in NUUO NVRmini 2 1.7.6 through 3.0.0 and NETGEAR ReadyNAS Surveillance 1.1.2 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the sn parameter to the transfer_license command.

Action-Not Available
Vendor-n/aNUUO Inc.NETGEAR, Inc.
Product-nvrmini_2readynas_surveillancen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8957
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-7.2||HIGH
EPSS-55.52% / 98.09%
||
7 Day CHG~0.00%
Published-17 Sep, 2024 | 20:08
Updated-27 Dec, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-11-25||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
PTZOptics NDI and SDI Cameras Command Injection via NTP Address Configuration

PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices.

Action-Not Available
Vendor-PTZOptics
Product-pt30x-sdipt30x-sdi_firmwarept30x-ndi-xx-g2pt30x-ndi-xx-g2_firmwarePT30X-SDIPT30X-NDIpt30x-ndi_firmwarept30x-sdi_firmwarePT30X-SDI/NDI Cameras
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-9461
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.2||HIGH
EPSS-6.69% / 91.32%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 13:56
Updated-08 Apr, 2026 | 17:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Total Upkeep <= 1.16.6 - Authenticated (Administrator+) Remote Code Execution via Backup Settings

The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.6 via the cron_interval parameter. This is due to missing input validation and sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.

Action-Not Available
Vendor-BoldGrid (InMotion Hosting, Inc.)
Product-total_upkeepTotal Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGridtotal_upkeep
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-8273
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.24% / 47.37%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 04:30
Updated-11 May, 2026 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DNS-320 system_mgr.cgi cgi_merge_user os command injection

A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.

Action-Not Available
Vendor-D-Link Corporation
Product-dns-320dns-320_firmwareDNS-320
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-9474
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-6.9||MEDIUM
EPSS-94.17% / 99.92%
||
7 Day CHG-0.01%
Published-18 Nov, 2024 | 15:48
Updated-04 Nov, 2025 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-12-09||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.
PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-pan-osPAN-OSCloud NGFWPrisma Accesspan-osPAN-OS
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-7119
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.97% / 76.72%
||
7 Day CHG~0.00%
Published-27 Apr, 2026 | 11:30
Updated-30 Apr, 2026 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda HG3 formCountrystr os command injection

A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknown function of the file /boaform/formCountrystr. The manipulation of the argument countrystr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-hg3_firmwarehg3HG3
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-9139
Matching Score-4
Assigner-Moxa Inc.
ShareView Details
Matching Score-4
Assigner-Moxa Inc.
CVSS Score-8.6||HIGH
EPSS-0.27% / 50.46%
||
7 Day CHG~0.00%
Published-14 Oct, 2024 | 08:20
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection in Restricted Command

The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.

Action-Not Available
Vendor-Moxa Inc.
Product-EDR-810 SeriesEDR-G9010 SeriesEDR-G9004 SeriesTN-4900 SeriesNAT-102 SeriesEDF-G1002-BP SeriesEDR-8010 SeriesOnCell G4302-LTE4 Seriesoncell_g4302-lte4_firmwaretn-4900_firmwareedr-g9004_firmwareedr-8010_firmwarenat-102_firmwareedr-g9010_firmwareedr-810_firmwareedf-g1002-bp_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-9200
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-7.2||HIGH
EPSS-0.53% / 67.46%
||
7 Day CHG~0.00%
Published-03 Dec, 2024 | 01:33
Updated-21 Jan, 2025 | 21:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A post-authentication command injection vulnerability in the "host" parameter of the diagnostic function in Zyxel VMG4005-B50A firmware versions through V5.15(ABQA.2.2)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-vmg4005-b50bvmg4005-b50a_firmwarevmg4005-b60a_firmwarevmg4005-b50avmg4005-b50b_firmwareemg6726-b10avmg4927-b50avmg3927-b50bvmg4927-b50a_firmwarevmg3927-b50b_firmwarevmg4005-b60aemg6726-b10a_firmwareVMG4005-B50A firmwarevmg4005-b50a_firmwarevmg4927-b50a_firmwareemg6726-b10a_firmwarevmg4005-b50b_firmwarevmg3927-b50b_firmwarevmg4005-b60a_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-6992
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.40% / 60.75%
||
7 Day CHG~0.00%
Published-25 Apr, 2026 | 18:00
Updated-30 Apr, 2026 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys MR9600 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus os command injection

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-mr9600_firmwaremr9600MR9600
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8280
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.41% / 61.38%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-8272
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.08% / 22.89%
||
7 Day CHG~0.00%
Published-11 May, 2026 | 04:15
Updated-12 May, 2026 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DNS-320 webfile_mgr.cgi chown os command injection

A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

Action-Not Available
Vendor-D-Link Corporation
Product-dns-320dns-320_firmwareDNS-320
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8281
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.44% / 63.18%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8279
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.44% / 63.18%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8686
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-8.6||HIGH
EPSS-0.28% / 50.95%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 16:34
Updated-03 Oct, 2024 | 01:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PAN-OS: Command Injection Vulnerability

A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-pan-osCloud NGFWPAN-OSPrisma Accessprisma_accesspan-oscloud_ngfw
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8190
Matching Score-4
Assigner-Ivanti
ShareView Details
Matching Score-4
Assigner-Ivanti
CVSS Score-7.2||HIGH
EPSS-91.41% / 99.67%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:33
Updated-24 Oct, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-10-04||As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates.

An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.

Action-Not Available
Vendor-Ivanti Software
Product-cloud_services_applianceCSA (Cloud Services Appliance)endpoint_manager_cloud_services_applianceCloud Services Appliance
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-7728
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.2||HIGH
EPSS-1.25% / 79.47%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 03:26
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CAYIN Technology CMS - OS Command Injection

The specific CGI of the CAYIN Technology CMS does not properly validate user input, allowing a remote attacker with administrator privileges to inject OS commands into the specific parameter and execute them on the remote server.

Action-Not Available
Vendor-CAYIN Technology Co.
Product-CMS-SE(22.04)CMS-SE(18.04)CMS-SEcms-secms-se\(22.04\)cms-se\(18.04\)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33358
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.81% / 74.25%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 17:53
Updated-03 Aug, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities exist in RaspAP 2.3 to 2.6.5 in the "interface", "ssid" and "wpa_passphrase" POST parameters in /hostapd, when the parameter values contain special characters such as ";" or "$()" which enables an authenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-raspapn/a
Product-raspapn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8278
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.44% / 63.18%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-8316
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.53% / 81.45%
||
7 Day CHG~0.00%
Published-13 Feb, 2019 | 03:00
Updated-16 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetWebFilterSettings API function, as demonstrated by shell metacharacters in the WebFilterURLs field.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-878dir-878_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-8318
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.52% / 81.40%
||
7 Day CHG~0.00%
Published-13 Feb, 2019 | 03:00
Updated-16 Sep, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetSysEmailSettings API function, as demonstrated by shell metacharacters in the SMTPServerPort field.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-878dir-878_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-3028
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.57% / 68.71%
||
7 Day CHG~0.00%
Published-25 Nov, 2016 | 03:38
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Access Manager for Web 7.0 before IF2 and 8.0 before 8.0.1.4 IF3 and Security Access Manager 9.0 before 9.0.1.0 IF5 allow remote authenticated users to execute arbitrary commands by leveraging LMI admin access.

Action-Not Available
Vendor-n/aIBM Corporation
Product-security_access_manager_for_websecurity_access_managern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-48664
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.2||HIGH
EPSS-0.16% / 35.82%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 16:08
Updated-02 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.

Action-Not Available
Vendor-Dell Inc.
Product-unisphere_for_powermax_virtual_appliancesolutions_enabler_virtual_appliancepowermax_osvApp Manager
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-49329
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.27% / 49.99%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 00:00
Updated-20 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Anomali Match before 4.6.2 allows OS Command Injection. An authenticated admin user can inject and execute operating system commands. This arises from improper handling of untrusted input, enabling an attacker to elevate privileges, execute system commands, and potentially compromise the underlying operating system. The fixed versions are 4.4.5, 4.5.4, and 4.6.2. The earliest affected version is 4.3.

Action-Not Available
Vendor-anomalin/a
Product-matchn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-48428
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.2||HIGH
EPSS-0.07% / 20.53%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 11:27
Updated-25 Feb, 2026 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The radius configuration mechanism of affected products does not correctly check uploaded certificates. A malicious admin could upload a crafted certificate resulting in a denial-of-service condition or potentially issue commands on system level.

Action-Not Available
Vendor-Siemens AG
Product-sinec_insSINEC INS
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-8319
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.52% / 81.40%
||
7 Day CHG~0.00%
Published-13 Feb, 2019 | 03:00
Updated-16 Sep, 2024 | 23:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteIPv4Settings API function, as demonstrated by shell metacharacters in the Gateway field.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-878dir-878_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-4855
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.35% / 57.76%
||
7 Day CHG~0.00%
Published-15 Apr, 2024 | 17:58
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability was identified in SMM/SMM2 and FPC that could allow an authenticated user with elevated privileges to execute unauthorized commands via IPMI.

Action-Not Available
Vendor-Lenovo Group Limited
Product-SMM, SMM2, FPCsystem_management_module_firmwarefan_power_controller
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-48665
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.2||HIGH
EPSS-0.16% / 35.82%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 16:12
Updated-02 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.

Action-Not Available
Vendor-Dell Inc.
Product-unisphere_for_powermax_virtual_appliancesolutions_enabler_virtual_appliancepowermax_osvApp Manager,
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-1297
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.61% / 69.91%
||
7 Day CHG~0.00%
Published-26 Feb, 2016 | 02:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Device Manager GUI in Cisco Application Control Engine (ACE) 4710 A5 before A5(3.1) allows remote authenticated users to bypass intended RBAC restrictions and execute arbitrary CLI commands with admin privileges via an unspecified parameter in a POST request, aka Bug ID CSCul84801.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-application_control_engine_softwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-48662
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.2||HIGH
EPSS-0.16% / 35.82%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 15:59
Updated-02 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.

Action-Not Available
Vendor-Dell Inc.
Product-unisphere_for_powermax_virtual_appliancesolutions_enabler_virtual_appliancepowermax_osvApp Manager
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2013-10061
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.6||HIGH
EPSS-73.14% / 98.81%
||
7 Day CHG~0.00%
Published-01 Aug, 2025 | 20:45
Updated-07 Apr, 2026 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netgear Routers setup.cgi RCE

An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-dgn1000bdgn1000b_firmwareDGN1000B
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-8313
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.52% / 81.40%
||
7 Day CHG~0.00%
Published-13 Feb, 2019 | 03:00
Updated-16 Sep, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv6FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv6AddressRangeStart field.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-878dir-878_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3198
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-6.5||MEDIUM
EPSS-2.20% / 84.55%
||
7 Day CHG~0.00%
Published-22 Jul, 2021 | 18:27
Updated-16 Sep, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ivanti MobileIron Core clish Restricted Shell Escape via OS Command Injection

By abusing the 'install rpm url' command, an attacker can escape the restricted clish shell on affected versions of Ivanti MobileIron Core. This issue was fixed in version 11.1.0.0.

Action-Not Available
Vendor-Ivanti Software
Product-mobileironMobileIron Core
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-8315
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.52% / 81.40%
||
7 Day CHG~0.00%
Published-13 Feb, 2019 | 03:00
Updated-17 Sep, 2024 | 03:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv4FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv4AddressRangeStart field.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-878dir-878_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-10709
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-75.58% / 98.92%
||
7 Day CHG~0.00%
Published-22 Jan, 2018 | 04:00
Updated-06 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pfSense before 2.3 allows remote authenticated users to execute arbitrary OS commands via a '|' character in the status_rrd_graph_img.php graph parameter, related to _rrd_graph_img.php.

Action-Not Available
Vendor-pfsensen/a
Product-pfsensen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2016-11054
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-1.26% / 79.54%
||
7 Day CHG~0.00%
Published-28 Apr, 2020 | 15:57
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETGEAR DGN2200v4 devices before 2017-01-06 are affected by command execution and an FTP insecure root directory.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-dgn2200_firmwaredgn2200n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-7203
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-7.2||HIGH
EPSS-0.92% / 76.06%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 01:36
Updated-13 Dec, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.60 through V5.38 and USG FLEX series firmware versions from V4.60 through V5.38 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device by executing a crafted CLI command.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-zldusg_flex_50watp200atp500atp700atp100usg_flex_100axatp800usg_flex_200usg_flex_700usg_flex_100atp100wusg_flex_100wusg_flex_500usg_flex_50ATP series firmwareUSG FLEX series firmwareatp800_firmwareusg_flex_700h_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 23
  • 24
  • Next
Details not found