Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-3333

Summary
Assigner-NEC
Assigner Org ID-f2760a35-e0d8-4637-ac4c-cc1a2de3e282
Published At-28 Jun, 2023 | 01:33
Updated At-04 Dec, 2024 | 20:54
Rejected At-
Credits

Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:NEC
Assigner Org ID:f2760a35-e0d8-4637-ac4c-cc1a2de3e282
Published At:28 Jun, 2023 | 01:33
Updated At:04 Dec, 2024 | 20:54
Rejected At:
▼CVE Numbering Authority (CNA)

Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.

Affected Products
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG2600HP2
Default Status
unknown
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG2600HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG2200HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG2200HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG1800HP2
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG1800HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG1400HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG600HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WG300HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WF300HP
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR9500N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR9300N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR8750N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR8700N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR8600N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR8370N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR8175N
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
NEC CorporationNEC Corporation
Product
Aterm WR8170N
Default Status
unaffected
Versions
Affected
  • all versions
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78: Improper Neutralization of Special Elements used in an OS Command
Type: CWE
CWE ID: CWE-78
Description: CWE-78: Improper Neutralization of Special Elements used in an OS Command
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Stop using the products or remove the USB storage.

Exploits

Credits

reporter
Mr. Taizoh Tsukamoto in Mitsui Bussan Secure Directions, Inc.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
N/A
Hyperlink: https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
x_transferred
Hyperlink: https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt-info@cyber.jp.nec.com
Published At:28 Jun, 2023 | 02:15
Updated At:05 Jul, 2023 | 19:19

Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

NEC Corporation
nec
>>aterm_wf300hp_firmware>>-
cpe:2.3:o:nec:aterm_wf300hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wf300hp>>-
cpe:2.3:h:nec:aterm_wf300hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1400hp_firmware>>-
cpe:2.3:o:nec:aterm_wg1400hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1400hp>>-
cpe:2.3:h:nec:aterm_wg1400hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp_firmware>>-
cpe:2.3:o:nec:aterm_wg1800hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp>>-
cpe:2.3:h:nec:aterm_wg1800hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp2_firmware>>-
cpe:2.3:o:nec:aterm_wg1800hp2_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp2>>-
cpe:2.3:h:nec:aterm_wg1800hp2:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2200hp_firmware>>-
cpe:2.3:o:nec:aterm_wg2200hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2200hp>>-
cpe:2.3:h:nec:aterm_wg2200hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hp_firmware>>-
cpe:2.3:o:nec:aterm_wg2600hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hp>>-
cpe:2.3:h:nec:aterm_wg2600hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hp2_firmware>>-
cpe:2.3:o:nec:aterm_wg2600hp2_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hp2>>-
cpe:2.3:h:nec:aterm_wg2600hp2:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg300hp_firmware>>-
cpe:2.3:o:nec:aterm_wg300hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg300hp>>-
cpe:2.3:h:nec:aterm_wg300hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg600hp_firmware>>-
cpe:2.3:o:nec:aterm_wg600hp_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg600hp>>-
cpe:2.3:h:nec:aterm_wg600hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8600n_firmware>>-
cpe:2.3:o:nec:aterm_wr8600n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8600n>>-
cpe:2.3:h:nec:aterm_wr8600n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8700n_firmware>>-
cpe:2.3:o:nec:aterm_wr8700n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8700n>>-
cpe:2.3:h:nec:aterm_wr8700n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8750n_firmware>>-
cpe:2.3:o:nec:aterm_wr8750n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8750n>>-
cpe:2.3:h:nec:aterm_wr8750n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr9300n_firmware>>-
cpe:2.3:o:nec:aterm_wr9300n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr9300n>>-
cpe:2.3:h:nec:aterm_wr9300n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr9500n_firmware>>-
cpe:2.3:o:nec:aterm_wr9500n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr9500n>>-
cpe:2.3:h:nec:aterm_wr9500n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8170n_firmware>>-
cpe:2.3:o:nec:aterm_wr8170n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8170n>>-
cpe:2.3:h:nec:aterm_wr8170n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8175n_firmware>>-
cpe:2.3:o:nec:aterm_wr8175n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8175n>>-
cpe:2.3:h:nec:aterm_wr8175n:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8370n_firmware>>-
cpe:2.3:o:nec:aterm_wr8370n_firmware:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wr8370n>>-
cpe:2.3:h:nec:aterm_wr8370n:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE-78Secondarypsirt-info@cyber.jp.nec.com
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-78
Type: Secondary
Source: psirt-info@cyber.jp.nec.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.htmlpsirt-info@cyber.jp.nec.com
Broken Link
Hyperlink: https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
Source: psirt-info@cyber.jp.nec.com
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

658Records found

CVE-2024-8281
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.42% / 61.50%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-14 Sep, 2024 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8686
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-8.6||HIGH
EPSS-0.28% / 50.61%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 16:34
Updated-03 Oct, 2024 | 01:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PAN-OS: Command Injection Vulnerability

A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-pan-osCloud NGFWPAN-OSPrisma Accessprisma_accesspan-oscloud_ngfw
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-9200
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-7.2||HIGH
EPSS-0.46% / 63.47%
||
7 Day CHG~0.00%
Published-03 Dec, 2024 | 01:33
Updated-21 Jan, 2025 | 21:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A post-authentication command injection vulnerability in the "host" parameter of the diagnostic function in Zyxel VMG4005-B50A firmware versions through V5.15(ABQA.2.2)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-vmg4005-b50bvmg4005-b50a_firmwarevmg4005-b60a_firmwarevmg4005-b50avmg4005-b50b_firmwareemg6726-b10avmg4927-b50avmg3927-b50bvmg4927-b50a_firmwarevmg3927-b50b_firmwarevmg4005-b60aemg6726-b10a_firmwareVMG4005-B50A firmwarevmg4005-b50a_firmwarevmg4927-b50a_firmwareemg6726-b10a_firmwarevmg4005-b50b_firmwarevmg3927-b50b_firmwarevmg4005-b60a_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-29143
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.2||HIGH
EPSS-5.03% / 89.50%
||
7 Day CHG~0.00%
Published-22 Jul, 2021 | 13:31
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.

Action-Not Available
Vendor-n/aAruba Networks
Product-cx_8320aos-cx_firmwarecx_8360cx_8400cx_6300cx_6400cx_6200fcx_8325Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-9139
Matching Score-4
Assigner-Moxa Inc.
ShareView Details
Matching Score-4
Assigner-Moxa Inc.
CVSS Score-8.6||HIGH
EPSS-0.26% / 48.84%
||
7 Day CHG~0.00%
Published-14 Oct, 2024 | 08:20
Updated-06 Nov, 2024 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection in Restricted Command

The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.

Action-Not Available
Vendor-Moxa Inc.
Product-EDR-810 SeriesEDR-G9010 SeriesEDR-G9004 SeriesTN-4900 SeriesNAT-102 SeriesEDF-G1002-BP SeriesEDR-8010 SeriesOnCell G4302-LTE4 Seriesoncell_g4302-lte4_firmwaretn-4900_firmwareedr-g9004_firmwareedr-8010_firmwarenat-102_firmwareedr-g9010_firmwareedr-810_firmwareedf-g1002-bp_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8190
Matching Score-4
Assigner-Ivanti
ShareView Details
Matching Score-4
Assigner-Ivanti
CVSS Score-7.2||HIGH
EPSS-91.94% / 99.68%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:33
Updated-24 Oct, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-10-04||As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive future security updates.

An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.

Action-Not Available
Vendor-Ivanti Software
Product-cloud_services_applianceCSA (Cloud Services Appliance)endpoint_manager_cloud_services_applianceCloud Services Appliance
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8279
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.42% / 61.50%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-14 Sep, 2024 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8278
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.44% / 62.61%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-14 Sep, 2024 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8280
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.2||HIGH
EPSS-0.40% / 59.80%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-14 Sep, 2024 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCCthinkedge_se455_v3_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx1320_firmwarethinksystem_sr630_v3_firmwarethinksystem_sd530_v3_firmwarethinkagile_hx7820_firmwarethinksystem_sr635_v3_firmwarethinkedge_se350_v2_firmwarethinkagile_hx1021_edge_certified_node_3yr_firmwarethinksystem_sr850_v3_firmwarethinksystem_sr950_v3_firmwarethinkedge_se450__firmwarethinkagile_hx7530_firmwarethinksystem_st250_v3_firmwarethinksystem_st650_v3_firmwarethinkagile_hx_enclosure_certified_node_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-8957
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-7.2||HIGH
EPSS-55.52% / 98.01%
||
7 Day CHG~0.00%
Published-17 Sep, 2024 | 20:08
Updated-27 Dec, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-11-25||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
PTZOptics NDI and SDI Cameras Command Injection via NTP Address Configuration

PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices.

Action-Not Available
Vendor-PTZOptics
Product-pt30x-sdipt30x-sdi_firmwarept30x-ndi-xx-g2pt30x-ndi-xx-g2_firmwarePT30X-SDIPT30X-NDIpt30x-ndi_firmwarept30x-sdi_firmwarePT30X-SDI/NDI Cameras
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-7591
Matching Score-4
Assigner-Progress Software Corporation
ShareView Details
Matching Score-4
Assigner-Progress Software Corporation
CVSS Score-10||CRITICAL
EPSS-31.46% / 96.66%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 17:16
Updated-18 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection

Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects: * LoadMaster: 7.2.40.0 and above * ECS: All versions * Multi-Tenancy: 7.1.35.4 and above

Action-Not Available
Vendor-KempProgress Software Corporation
Product-multi-tenant_hypervisor_firmwareloadmasterLoadMasterloadmaster_mtloadmaster
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-44080
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-16.50% / 94.73%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 00:45
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Command Injection vulnerability in httpd web server (setup.cgi) in SerComm h500s, FW: lowi-h500s-v3.4.22 allows logged in administrators to arbitrary OS commands as root in the device via the connection_type parameter of the statussupport_diagnostic_tracing.json endpoint.

Action-Not Available
Vendor-sercommn/a
Product-h500sh500s_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-7203
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-7.2||HIGH
EPSS-0.92% / 75.52%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 01:36
Updated-13 Dec, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.60 through V5.38 and USG FLEX series firmware versions from V4.60 through V5.38 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device by executing a crafted CLI command.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-zldusg_flex_50watp200atp500atp700atp100usg_flex_100axatp800usg_flex_200usg_flex_700usg_flex_100atp100wusg_flex_100wusg_flex_500usg_flex_50ATP series firmwareUSG FLEX series firmwareatp800_firmwareusg_flex_700h_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-7728
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.2||HIGH
EPSS-1.25% / 79.00%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 03:26
Updated-14 Aug, 2024 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CAYIN Technology CMS - OS Command Injection

The specific CGI of the CAYIN Technology CMS does not properly validate user input, allowing a remote attacker with administrator privileges to inject OS commands into the specific parameter and execute them on the remote server.

Action-Not Available
Vendor-CAYIN Technology Co.
Product-CMS-SE(22.04)CMS-SE(18.04)CMS-SEcms-secms-se\(22.04\)cms-se\(18.04\)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-6486
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.2||HIGH
EPSS-1.31% / 79.50%
||
7 Day CHG~0.00%
Published-15 May, 2025 | 20:07
Updated-11 Jun, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick Engine < 1.7.11 - Administrator+ OS Command Injection

The ImageMagick Engine ImageMagick Engine WordPress plugin before 1.7.11 for WordPress is vulnerable to OS Command Injection via the "cli_path" parameter. This allows authenticated attackers, with administrator-level permission to execute arbitrary OS commands on the server leading to remote code execution.

Action-Not Available
Vendor-orangelabUnknown
Product-imagemagick_engineImageMagick Engine
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-6333
Matching Score-4
Assigner-Xerox Corporation
ShareView Details
Matching Score-4
Assigner-Xerox Corporation
CVSS Score-7.2||HIGH
EPSS-2.73% / 85.64%
||
7 Day CHG~0.00%
Published-17 Oct, 2024 | 13:51
Updated-17 Sep, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Remote Code Execution in Altalink, Versalink & WorkCentre Products

Authenticated Remote Code Execution in Altalink, Versalink & WorkCentre Products.

Action-Not Available
Vendor-Xerox Corporation
Product-AltaLink® B8045 / B8055 / B8065 / B8075 / B8090 | C8030 / C8035 / C8045 / C8055 / C807AltaLink®C8130 / C8135 / C8145 / C8155 / C8170 | B8145 / B8155 / B8170 Common Criteria (Aug 2024)WorkCentre 7830/7835iWorkCentre EC7856AltaLink® C8130 / C8135 / C8145 / C8155 / C8170 | B8145 / B8155 / B8170 Common Criteria Certified (Aug 2023)WorkCentre EC7836VersaLink® B625 / C625 | B425 / C425 Common Criteria Certified (2024)Xerox® EC8036 / EC8056 - Common Criteria (June 2024)WorkCentre 7845/7855iWorkCentre 7220/7225iWorkCentre 5945/55iWorkCentre 7970/7970iXerox® EC8036 / EC8056 - Common Criteria (June 2022)WorkCentre 7845/7855 (IBG)WorkCentre 3655/3655iXerox® EC8036 / EC8056WorkCentre 6655/6655iworkcentre_firmwareversalink_firmwarexerox_firmwarealtalink_firmware
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2142
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.54%
||
7 Day CHG+0.11%
Published-08 Feb, 2026 | 08:02
Updated-10 Feb, 2026 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_qos sub_420688 os command injection

A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420688 of the file /goform/set_qos. Executing a manipulation can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-22229
Matching Score-4
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-4
Assigner-TP-Link Systems Inc.
CVSS Score-8.6||HIGH
EPSS-0.12% / 31.67%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 17:58
Updated-06 Feb, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability on TP-Link Archer BE230 v1.2

A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-archer_be230archer_be230_firmwareArcher BE230 v1.2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2210
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.23% / 45.34%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 02:02
Updated-11 Feb, 2026 | 18:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_filtering sub_4211C8 os command injection

A vulnerability has been found in D-Link DIR-823X 250416. This affects the function sub_4211C8 of the file /goform/set_filtering. Such manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2152
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-1.70% / 81.95%
||
7 Day CHG~0.00%
Published-08 Feb, 2026 | 12:32
Updated-11 Feb, 2026 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-615 Web Configuration adv_routing.php os command injection

A vulnerability was found in D-Link DIR-615 4.10. This vulnerability affects unknown code of the file adv_routing.php of the component Web Configuration Interface. Performing a manipulation of the argument dest_ip/ submask/ gw results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-615_firmwaredir-615DIR-615
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2155
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.25% / 48.17%
||
7 Day CHG~0.00%
Published-08 Feb, 2026 | 14:02
Updated-11 Feb, 2026 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X Configuration set_dmz sub_4208A0 os command injection

A security flaw has been discovered in D-Link DIR-823X 250416. The affected element is the function sub_4208A0 of the file /goform/set_dmz of the component Configuration Handler. The manipulation of the argument dmz_host/dmz_enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2175
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.54%
||
7 Day CHG~0.00%
Published-08 Feb, 2026 | 18:32
Updated-11 Feb, 2026 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_upnp sub_420618 os command injection

A weakness has been identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_420618 of the file /goform/set_upnp. This manipulation of the argument upnp_enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-22224
Matching Score-4
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-4
Assigner-TP-Link Systems Inc.
CVSS Score-8.5||HIGH
EPSS-0.53% / 66.56%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 17:52
Updated-06 Feb, 2026 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability on TP-Link Archer BE230 v1.2

A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-archer_be230archer_be230_firmwareArcher BE230 v1.2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-55904
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 28.99%
||
7 Day CHG~0.00%
Published-14 Feb, 2025 | 03:23
Updated-18 Aug, 2025 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM DevOps Deploy / IBM UrbanCode Deploy command injection

IBM DevOps Deploy 8.0 through 8.0.1.4, 8.1 through 8.1.0.0 / IBM UrbanCode Deploy 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14, and 7.3 through 7.3.2.9 could allow a remote privileged authenticated attacker to execute arbitrary commands on the system by sending specially crafted input containing special elements.

Action-Not Available
Vendor-IBM Corporation
Product-urbancode_deploydevops_deployUrbanCode DeployDevOps Deploy
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2151
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.31% / 53.78%
||
7 Day CHG~0.00%
Published-08 Feb, 2026 | 12:02
Updated-11 Feb, 2026 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-615 DMZ Host Feature adv_firewall.php os command injection

A vulnerability has been found in D-Link DIR-615 4.10. This affects an unknown part of the file adv_firewall.php of the component DMZ Host Feature. Such manipulation of the argument dmz_ipaddr  leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-615_firmwaredir-615DIR-615
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-25206
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-17.59% / 94.92%
||
7 Day CHG~0.00%
Published-20 Jul, 2021 | 18:45
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web console for Mimosa B5, B5c, and C5x firmware through 2.8.0.2 allows authenticated command injection in the Throughput, WANStats, PhyStats, and QosStats API classes. An attacker with access to a web console account may execute operating system commands on affected devices by sending crafted POST requests to the affected endpoints (/core/api/calls/Throughput.php, /core/api/calls/WANStats.php, /core/api/calls/PhyStats.php, /core/api/calls/QosStats.php). This results in the complete takeover of the vulnerable device. This vulnerability does not occur in the older 1.5.x firmware versions.

Action-Not Available
Vendor-mimosan/a
Product-c5cb5cb5b5c_firmwarec5c_firmwareb5_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2143
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.54%
||
7 Day CHG+0.11%
Published-08 Feb, 2026 | 08:32
Updated-10 Feb, 2026 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X DDNS Service set_ddns os command injection

A security vulnerability has been detected in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/set_ddns of the component DDNS Service. The manipulation of the argument ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-22226
Matching Score-4
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-4
Assigner-TP-Link Systems Inc.
CVSS Score-8.5||HIGH
EPSS-0.53% / 66.56%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 17:55
Updated-06 Feb, 2026 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability on TP-Link Archer BE230 v1.2

A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration module on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-archer_be230archer_be230_firmwareArcher BE230 v1.2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-22227
Matching Score-4
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-4
Assigner-TP-Link Systems Inc.
CVSS Score-8.5||HIGH
EPSS-0.53% / 66.56%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 17:56
Updated-06 Feb, 2026 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability on TP-Link Archer BE230 v1.2

A command injection vulnerability may be exploited after the admin's authentication via the configuration backup restoration function of the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-archer_be230archer_be230_firmwareArcher BE230 v1.2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2260
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.19% / 41.11%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:02
Updated-12 Feb, 2026 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DCS-931L setSysAdmin os command injection

A vulnerability was found in D-Link DCS-931L up to 1.13.0. This affects an unknown part of the file /goform/setSysAdmin. The manipulation of the argument AdminID results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-D-Link Corporation
Product-dcs-931ldcs-931l_firmwareDCS-931L
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2157
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.54%
||
7 Day CHG~0.00%
Published-08 Feb, 2026 | 15:02
Updated-11 Feb, 2026 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_static_route_table sub_4175CC os command injection

A security vulnerability has been detected in D-Link DIR-823X 250416. This affects the function sub_4175CC of the file /goform/set_static_route_table. Such manipulation of the argument interface/destip/netmask/gateway/metric leads to os command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-5672
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-7.2||HIGH
EPSS-0.71% / 71.83%
||
7 Day CHG~0.00%
Published-03 Jul, 2024 | 12:26
Updated-13 Feb, 2025 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Red Lion Europe: mbNET.mini vulnerable to OS command injection

A high privileged remote attacker can execute arbitrary system commands via GET requests due to improper neutralization of special elements used in an OS command.

Action-Not Available
Vendor-Red Lion EuropeHelmholzredlionhelmholz
Product-REX 100mbNET.minirex_100_firmwarembnet_mini
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-42081
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-9.1||CRITICAL
EPSS-0.08% / 24.65%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 06:29
Updated-22 Sep, 2025 | 06:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Remote Command Execution vulnerability in OSNEXUS QuantaStor before 6.0.0.355

An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API. POC http://<IP_ADDRESS>/qstorapi/storageSystemModify?storageSystem=&newName=quantastor&newDescription=;ls${IFS}-al&newLocation=4&newEnclosureLayoutId=5&newDnsServerList=;ls${IFS}-al&externalHostName=&newNTPServerList=;ls${IFS}-al

Action-Not Available
Vendor-osnexusOSNEXUS
Product-quantastorQuantaStor
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2188
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.40% / 60.14%
||
7 Day CHG~0.00%
Published-08 Feb, 2026 | 21:32
Updated-10 Feb, 2026 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UTT 进取 521G formPdbUpConfig sub_446B18 os command injection

A vulnerability was determined in UTT 进取 521G 3.1.1-190816. The impacted element is the function sub_446B18 of the file /goform/formPdbUpConfig. Executing a manipulation of the argument policyNames can lead to os command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.

Action-Not Available
Vendor-uttUTT
Product-521g_firmware521g进取 521G
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-22225
Matching Score-4
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-4
Assigner-TP-Link Systems Inc.
CVSS Score-8.5||HIGH
EPSS-0.53% / 66.56%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 17:53
Updated-06 Feb, 2026 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability on TP-Link Archer BE230 v1.2

A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-archer_be230archer_be230_firmwareArcher BE230 v1.2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-54018
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 36.93%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 14:54
Updated-14 Jan, 2026 | 13:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisandboxFortiSandbox
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-54008
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.2||HIGH
EPSS-2.02% / 83.43%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 18:23
Updated-11 Dec, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Remote Code Execution (RCE) in HPE Aruba Networking AirWave Management Platform

An authenticated Remote Code Execution (RCE) vulnerability exists in the AirWave CLI. Successful exploitation of this vulnerability could allow a remote authenticated threat actor to run arbitrary commands as a privileged user on the underlying host.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)
Product-HPE Aruba Networking AirWave Management Platform
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2082
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.17% / 37.94%
||
7 Day CHG-0.04%
Published-07 Feb, 2026 | 10:02
Updated-10 Feb, 2026 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_mac_clone os command injection

A vulnerability was identified in D-Link DIR-823X 250416. The impacted element is an unknown function of the file /goform/set_mac_clone. Such manipulation of the argument mac leads to os command injection. The attack may be performed from remote. The exploit is publicly available and might be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2129
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.54%
||
7 Day CHG+0.11%
Published-08 Feb, 2026 | 01:32
Updated-11 Feb, 2026 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_ac_status os command injection

A vulnerability was found in D-Link DIR-823X 250416. Affected by this issue is some unknown functionality of the file /goform/set_ac_status. Performing a manipulation of the argument ac_ipaddr/ac_ipstatus/ap_randtime results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2061
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.12% / 30.68%
||
7 Day CHG-0.12%
Published-06 Feb, 2026 | 18:02
Updated-11 Feb, 2026 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_ipv6 sub_424D20 os command injection

A vulnerability was determined in D-Link DIR-823X 250416. Affected by this issue is the function sub_424D20 of the file /goform/set_ipv6. Executing a manipulation can lead to os command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-832xdir-823x_firmwareDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-3211
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-1.18% / 78.36%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:40
Updated-15 Nov, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Web UI Command Injection Vulnerability

A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected device. The vulnerability is due to improper input sanitization. An attacker who has valid administrative access to an affected device could exploit this vulnerability by supplying a crafted input parameter on a form in the web UI and then submitting that form. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device, which could lead to complete system compromise.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 16.10.1
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-54024
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-7||HIGH
EPSS-0.87% / 74.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 14:02
Updated-23 Jul, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiisolatorFortiIsolator
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2026-2081
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.18% / 39.32%
||
7 Day CHG-0.03%
Published-07 Feb, 2026 | 09:32
Updated-10 Feb, 2026 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X set_password os command injection

A vulnerability was determined in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_password. This manipulation of the argument http_passwd causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-39362
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-86.75% / 99.41%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 21:16
Updated-27 Feb, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated command injection in SNMP options of a Device

Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-Fedora ProjectThe Cacti Group, Inc.
Product-cactifedoracacti
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2026-2120
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.30% / 52.54%
||
7 Day CHG+0.11%
Published-08 Feb, 2026 | 00:32
Updated-11 Feb, 2026 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-823X Configuration Parameter set_server_settings os command injection

A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-823x_firmwaredir-823xDIR-823X
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-40411
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-3.86% / 87.94%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:10
Updated-15 Apr, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.

Action-Not Available
Vendor-n/aReolink Innovation Limited
Product-rlc-410w_firmwarerlc-410wn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-40412
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-4.81% / 89.25%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:10
Updated-15 Apr, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An OScommand injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [8] the devname variable, that has the value of the name parameter provided through the SetDevName API, is not validated properly. This would lead to an OS command injection.

Action-Not Available
Vendor-n/aReolink Innovation Limited
Product-rlc-410w_firmwarerlc-410wn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-40410
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-4.81% / 89.25%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:10
Updated-15 Apr, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection.

Action-Not Available
Vendor-n/aReolink Innovation Limited
Product-rlc-410w_firmwarerlc-410wn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-40222
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-8.05% / 91.93%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 11:04
Updated-04 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rittal CMC PU III Web management Version affected: V3.11.00_2. Version fixed: V3.17.10 is affected by a remote code execution vulnerablity. It is possible to introduce shell code to create a reverse shell in the PU-Hostname field of the TCP/IP Configuration dialog. Web application fails to sanitize user input on Network TCP/IP configuration page. This allows the attacker to inject commands as root on the device which will be executed once the data is received.

Action-Not Available
Vendor-rittaln/a
Product-cmc_pu_iii_7030.000_firmwarecmc_pu_iii_7030.000n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-40407
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.1||CRITICAL
EPSS-32.57% / 96.74%
||
7 Day CHG~0.00%
Published-28 Jan, 2022 | 19:10
Updated-03 Nov, 2025 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-01-08||The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-n/aReolink Innovation Limited
Product-rlc-410w_firmwarerlc-410wn/aRLC-410W IP Camera
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 13
  • 14
  • Next
Details not found