Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-1115

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-31 Jan, 2024 | 20:00
Updated At-29 May, 2025 | 15:03
Rejected At-
Credits

openBI Setting.php dlfile os command injection

A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function dlfile of the file /application/websocket/controller/Setting.php. The manipulation of the argument phpPath leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252473 was assigned to this vulnerability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:31 Jan, 2024 | 20:00
Updated At:29 May, 2025 | 15:03
Rejected At:
▼CVE Numbering Authority (CNA)
openBI Setting.php dlfile os command injection

A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function dlfile of the file /application/websocket/controller/Setting.php. The manipulation of the argument phpPath leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252473 was assigned to this vulnerability.

Affected Products
Vendor
n/a
Product
openBI
Versions
Affected
  • 1.0.0
  • 1.0.1
  • 1.0.2
  • 1.0.3
  • 1.0.4
  • 1.0.5
  • 1.0.6
  • 1.0.7
  • 1.0.8
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 OS Command Injection
Type: CWE
CWE ID: CWE-78
Description: CWE-78 OS Command Injection
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
3.07.3HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
2.07.5N/A
AV:N/AC:L/Au:N/C:P/I:P/A:P
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Version: 3.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Version: 2.0
Base score: 7.5
Base severity: N/A
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
glzjin (VulDB User)
Timeline
EventDate
Advisory disclosed2024-01-31 00:00:00
VulDB entry created2024-01-31 01:00:00
VulDB entry last update2024-01-31 14:15:35
Event: Advisory disclosed
Date: 2024-01-31 00:00:00
Event: VulDB entry created
Date: 2024-01-31 01:00:00
Event: VulDB entry last update
Date: 2024-01-31 14:15:35
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.252473
vdb-entry
technical-description
https://vuldb.com/?ctiid.252473
signature
permissions-required
https://note.zhaoj.in/share/81JmiyogcYL7
broken-link
exploit
Hyperlink: https://vuldb.com/?id.252473
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/?ctiid.252473
Resource:
signature
permissions-required
Hyperlink: https://note.zhaoj.in/share/81JmiyogcYL7
Resource:
broken-link
exploit
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.252473
vdb-entry
technical-description
x_transferred
https://vuldb.com/?ctiid.252473
signature
permissions-required
x_transferred
https://note.zhaoj.in/share/81JmiyogcYL7
broken-link
exploit
x_transferred
Hyperlink: https://vuldb.com/?id.252473
Resource:
vdb-entry
technical-description
x_transferred
Hyperlink: https://vuldb.com/?ctiid.252473
Resource:
signature
permissions-required
x_transferred
Hyperlink: https://note.zhaoj.in/share/81JmiyogcYL7
Resource:
broken-link
exploit
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:31 Jan, 2024 | 20:15
Updated At:17 May, 2024 | 02:35

A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function dlfile of the file /application/websocket/controller/Setting.php. The manipulation of the argument phpPath leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252473 was assigned to this vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Secondary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Type: Secondary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

openbi
openbi
>>openbi>>Versions up to 1.0.8(inclusive)
cpe:2.3:a:openbi:openbi:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarycna@vuldb.com
CWE ID: CWE-78
Type: Primary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://note.zhaoj.in/share/81JmiyogcYL7cna@vuldb.com
Broken Link
Third Party Advisory
https://vuldb.com/?ctiid.252473cna@vuldb.com
Permissions Required
Third Party Advisory
https://vuldb.com/?id.252473cna@vuldb.com
Third Party Advisory
Hyperlink: https://note.zhaoj.in/share/81JmiyogcYL7
Source: cna@vuldb.com
Resource:
Broken Link
Third Party Advisory
Hyperlink: https://vuldb.com/?ctiid.252473
Source: cna@vuldb.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: https://vuldb.com/?id.252473
Source: cna@vuldb.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1335Records found

CVE-2019-5029
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-87.77% / 99.43%
||
7 Day CHG~0.00%
Published-13 Nov, 2019 | 22:34
Updated-04 Aug, 2024 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable command injection vulnerability exists in the Config editor of the Exhibitor Web UI versions 1.0.9 to 1.7.1. Arbitrary shell commands surrounded by backticks or $() can be inserted into the editor and will be executed by the Exhibitor process when it launches ZooKeeper. An attacker can execute any command as the user running the Exhibitor process.

Action-Not Available
Vendor-exhibitor_projectn/a
Product-exhibitorExhibitor
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14478
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.30%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 03:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36260
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.8||CRITICAL
EPSS-94.44% / 99.98%
||
7 Day CHG~0.00%
Published-22 Sep, 2021 | 12:07
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-01-24||Apply updates per vendor instructions.

A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

Action-Not Available
Vendor-n/aHIKVISION
Product-ds-2cd2386g2-i\(u\)ds-7108ni-q1\/mds-2cd3386g2-is\(u\)ds-2df8a442ixs-ael\(t5\)ds-2cd2383g2-i\(u\)ds-2df8242ix-aely\(t3\)ds-2td6267-100c4l\/wy_firmwareds-2cd2121g0-i\(w\)\(s\)_firmwareds-2cd2643g2-izs_firmwareds-2cd3347g2-ls\(u\)ds-2cd2121g1-i\(w\)ds-7604ni-k1\/4p\/4gds-2df8442ixs-aelwy\(t5\)_firmwareds-2df8442ixs-aelw\(t2\)_firmwareds-7104ni-q1\/4pds-7616ni-k1_firmwareds-2df8442ixs-aely\(t5\)_firmwareds-2td1217b-6\/pa_firmwareds-2cd2666g2-izs_firmwareds-2cd3026g2-iu\/sl_firmwareds-2cd3643g2-izs_firmwareds-7608ni-k1\/4gds-2df6a436x-aely\(t5\)ds-2cd3156g2-isds-2df6a836x-ael\(t5\)_firmwareds-2cd3063g2-iuptz-n5225i-a_firmwareds-2df8225ix-ael\(t5\)ds-2cd3023g2-iu_firmwareds-2cd2066g2-iu\/sl_firmwareds-7108ni-q1\/8p_firmwareds-7108ni-q1ds-2td1117-2\/pa_firmwareds-2cd3023g2-iuds-2cd2583g2-i\(s\)_firmwareds-2cd2543g2-i\(ws\)ds-2cd2186g2-isuds-2cd2586g2-i\(s\)ds-2cd2086g2-i\(u\)_firmwareds-2cd2643g2-izsds-2cd3343g2-iu_firmwareds-7608ni-k1_firmwareds-2cd3723g2-izs_firmwareds-7108ni-q1_firmwareds-2td4166t-9_firmwareds-2cd2321g0-i\/nfds-2cd2686g2-izsu\/sl_firmwareds-2cd2066g2-i\(u\)_firmwareds-2cd2366g2-i\(u\)_firmwareds-2td6267-50h4l\/w_firmwareds-2df8a442ixs-ael\(t5\)_firmwareds-7608ni-k1\/8p\/4gds-7604ni-q1\/4p_firmwareds-2cd2121g0-i\(w\)\(s\)ptz-n2204i-de3_firmwareds-2df7232ix-aelw\(t3\)_firmwareds-2cd2523g2-i\(s\)_firmwareds-2df8242ix-aelw\(t3\)ds-2df8442ixs-aelwy\(t5\)ds-2cd2163g2-iu_firmwareds-2td8166-180ze2f\/v2_firmwareds-2cd2366g2-isu\/sl_firmwareds-2cd2683g2-izsds-7608ni-q1_firmwareids-2sk718mxs-d_firmwareds-2xe6422fwd-izhrsds-2cd3143g2-i\(s\)uds-2cd3356g2-isds-2cd3547g2-ls_firmwareds-2cd2326g2-isu\/sl_firmwareds-2td6267-75c4l\/w_firmwareds-2df8242i5x-aelw\(t3\)ds-7616ni-q2\/16pds-2cd2083g2-i\(u\)ds-2cd3523g2-is_firmwareds-2td8167-230zg2f\/wds-2td4167-50\/w_firmwareds-2cd2046g2-iu\/sl_firmwareds-2cd2527g2-lsds-2cd2327g2-l\(u\)ds-2cd3326g2-isu\/slds-2cd2686g2-izs_firmwareds-2cd2183g2-i\(s\)_firmwareds-2df7225ix-ael\(t3\)_firmwareds-2td1217b-3\/pads-2td1217b-6\/pads-2cd3756g2-izs_firmwareds-2cd3686g2-izs_firmwareds-2cd3156g2-is_firmwareids-2vs435-f840-ey\(t3\)ds-2df6a836x-ael\(t5\)ds-2td8166-180ze2f\/v2ids-2vs435-f840-eyds-2cd2646g2-izsu\/sl_firmwareds-2cd2623g2-izs_firmwareds-2cd2143g2-i\(s\)_firmwareds-2cd2183g2-i\(u\)_firmwareds-2cd2363g2-i\(u\)ds-2cd3343g2-iuds-2df8425ix-aelw\(t5\)_firmwareds-2cd3526g2-isds-2cd3026g2-isds-2df8425ix-ael\(t5\)ds-2cd3156g2-is\(u\)_firmwareds-2df8442ixs-aely\(t5\)ds-2cd2766g2-izs_firmwareds-2dy92500x-a\(t5\)_firmwareds-2cd3623g2-izs_firmwareds-2df8242ix-ael\(t5\)ds-2td6236t-50h2lds-2dy9236x-a\(t3\)_firmwareds-2cd2121g1-idwds-2cd2526g2-i\(s\)ds-2cd2166g2-i\(su\)ds-2cd2623g2-izsds-2cd2721g0-i\(z\)\(s\)_firmwareds-7108ni-q1\/8p\/mids-2pt9a144mxs-d\/t2ds-2cd3043g2-iu_firmwareds-2xe6452f-izh\(r\)sds-2td6267-75c4l\/wds-7616ni-q1ds-2dy92500x-a\(t5\)ds-2xe6422fwd-izhrs_firmwareds-2cd2583g2-i\(s\)ds-2cd3126g2-is\(u\)_firmwareids-2sk8144ixs-d\/jds-2td1117-6\/pads-2cd2563g2-i\(s\)ds-2cd2547g2-ls_firmwareds-7616ni-q2\/16p_firmwareds-2cd2723g2-izsds-2cd2127g2-\(-su\)_firmwareds-2cd2123g2-iuds-2cd3047g2-lsds-7604ni-k1_firmwareds-2cd3686g2-izsds-2df6a436x-ael\(t5\)ds-2cd2666g2-izsds-7604ni-k1ds-2cd3743g2-izs_firmwareds-2cd3186g2-is\(u\)_firmwareds-7616ni-q2ds-2df8250i8x-ael\(t3\)ds-2dy9236i8x-a\(t3\)_firmwareds-2td1117-6\/pa_firmwareds-7104ni-q1\/4p_firmwareds-2cd2183g2-i\(s\)ds-2cd2666g2-izsu\/sl_firmwareds-2df6a225x-ael\)t3\)_firmwareds-2cd2127g2-\(-su\)ds-2df6a825x-ael_firmwareds-2td8166-150zh2f\/v2ds-2td4137-25\/w_firmwareds-2td4137-50\/w_firmwareds-2cd2723g2-izs_firmwareds-2cd2027g2-lu\/sl_firmwareds-7108ni-q1\/m_firmwareds-2cd2086g2-iu\/sl_firmwareds-2cd2666g2-izsu\/slds-2cd3386g2-isds-2td8167-230zg2f\/w_firmwareds-7608ni-k1\/8p\/4g_firmwareds-2cd2421g0-i\(d\)wds-2df7225ix-aelw\(t3\)ptz-n4215-de3_firmwareds-2df8225ix-ael\(t3\)ds-2xe6482f-izhrsds-2cd2421g0-i\(d\)\(w\)ds-2td4167-50\/wds-2cd3726g2-izs_firmwareds-2cd2087g2-l\(u\)_firmwareds-2dyh2a0ixs-d\(t2\)ptz-n2204i-de3ds-2cd3356g2-is\(u\)_firmwareds-2cd2343g2-i\(u\)_firmwareds-2td4136t-9ds-2cd3786g2-izsds-2df8242i5x-ael\(t3\)ds-2cd2721g0-i\(z\)\(s\)ds-2df8250i8x-ael\(t3\)_firmwareds-2df5225x-ae3\(t3\)ds-2cd3123g2-i\(s\)u_firmwareds-2td6237-50h4l\/w_firmwareds-2cd3563g2-is_firmwareds-2td6266t-25h2l_firmwareds-2df6a436x-ael\(t3\)ds-2cd2743g2-izs_firmwareds-2cd2021g1-i\(w\)_firmwareds-2cd2063g2-i\(u\)ds-2cd3026g2-is_firmwareds-2df6a436x-ael\(t5\)_firmwareds-2cd3323g2-iuds-2cd2347g2-l\(u\)_firmwareds-2cd3586g2-isds-2df8a442ixs-af\/sp\(t5\)_firmwareds-2cd2566g2-i\(s\)ds-2df8442ixs-aelw\(t2\)ds-2cd2546g2-i\(s\)_firmwareds-2cd2363g2-i\(u\)_firmwareds-2cd2186g2-i\(su\)_firmwareds-2cd2446g2-i_firmwareds-7608ni-q2\/8p_firmwareds-2cd2421g0-i\(d\)w_firmwareptz-n4215-de3ds-2cd3326g2-isu\/sl_firmwareds-2dyh2a0ixs-d\(t2\)_firmwareds-7608ni-q1\/8p_firmwareptz-n4215i-de_firmwareds-2df5225x-ael\(t3\)_firmwareds-7604ni-k1\/4p\/4g_firmwareds-7608ni-q1\/8pds-7608ni-k1ds-2cd2366g2-isu\/slds-2td4166t-9ds-2df8242i5x-aelw\(t5\)_firmwareds-2df8225ih-aelds-2cd2121g1-idw_firmwareptz-n5225i-ads-2df8a442ixs-ael\(t2\)_firmwareds-2dy9236i8x-ads-2td6266t-25h2lds-2cd3626g2-izs_firmwareds-7104ni-q1_firmwareds-2cd2526g2-i\(s\)_firmwareds-2cd2586g2-i\(s\)_firmwareds-2cd2183g2-iu_firmwareds-2cd3756g2-izsds-2cd3663g2-izs_firmwareids-2vs435-f840-ey\(t3\)_firmwareds-2cd3123g2-i\(s\)uds-2df8236i5x-aelwds-2td4137-25\/wds-2cd3663g2-izsds-2cd3626g2-izsds-2df8225ih-ael\(w\)ds-2td8166-75c2f\/v2ds-7616ni-k1ds-2df8a442nxs-ael\(t5\)ds-2cd2621g0-i\(z\)\(s\)ds-2dy9240ix-a\(t5\)ds-2cd3763g2-izsds-2xe6442f-izhrs\(b\)_firmwareds-2cd2686g2-izsds-2df8a842ixs-ael\(t5\)ds-2td6237-75c4l\/w_firmwareds-7604ni-q1_firmwareds-2cd2186g2-isu_firmwareds-2cd3086g2-isds-2cd2386g2-isu\/slds-2df8442ixs-aelw\(t5\)ds-2cd3056g2-is_firmwareds-2cd2686g2-izsu\/slds-2td1217b-3\/pa_firmwareds-2df8225ix-aelw\(t3\)ds-2cd2123g2-iu_firmwareds-2df8242ix-ael\(t5\)_firmwareds-2cd2386g2-i\(u\)_firmwareds-2cd3386g2-is_firmwareds-2cd3743g2-izsds-2cd3556g2-is_firmwareds-2cd3163g2-i\(s\)uds-2cd2347g2-lsu\/slds-2cd2163g2-iuptz-n4225i-de_firmwareds-2df7232ix-ael\(t3\)_firmwareds-2td6236t-50h2l_firmwareptz-n4215i-deds-2cd3163g2-i\(s\)u_firmwareds-2xe6482f-izhrs_firmwareids-2sk8144ixs-d\/j_firmwareds-2cd3623g2-izsds-2cd2043g2-i\(u\)_firmwareds-2cd2183g2-iuds-2df6a825x-aelds-2cd2366g2-i\(u\)ds-2cd3063g2-iu_firmwareds-2cd2186g2-i\(su\)ds-7608ni-k1\/8pds-2cd2347g2-l\(u\)ptz-n2404i-de3ds-2cd2327g2-l\(u\)_firmwareds-2df8a842ixs-ael\(t5\)_firmwareds-2cd2047g2-l\(u\)_firmwareds-2cd3086g2-is_firmwareds-2cd3056g2-iu\/slds-2cd2626g2-izsu\/slds-2cd2386g2-isu\/sl_firmwareds-2cd3056g2-iu\/sl_firmwareds-2cd3156g2-is\(u\)ds-2cd2547g2-lsds-2xe6452f-izh\(r\)s_firmwareds-2df8225ih-ael\(w\)_firmwareds-2td4167-25\/wds-2cd2027g2-l\(u\)ds-2cd2786g2-izsds-2df8442ixs-ael\(t5\)ds-2cd2163g2-i\(s\)_firmwareds-2cd2323g2-i\(u\)_firmwareds-2cd2663g2-izs_firmwareds-2cd2147g2-l\(su\)ds-2cd2783g2-izsds-760ni-k1\/4pds-2dy9236ix-a\(t3\)ds-2df6a436x-aely\(t5\)_firmwareds-2dy9236ix-a\(t3\)_firmwareds-2cd2066g2-iu\/slds-2cd2147g2-l\(su\)_firmwareds-2cd2086g2-iu\/slds-2df8436i5x-aelw\(t3\)_firmwareds-2cd2766g2-izsds-2df8425ix-aelw\(t5\)ds-2xe6242f-is\/316l\(b\)_firmwareds-2cd2143g2-i\(s\)ds-7104ni-q1\/mds-2cd2023g2-i\(u\)_firmwareds-2cd2566g2-i\(s\)_firmwareds-2df8a442ixs-aely\(t5\)_firmwareds-7104ni-q1\/m_firmwareds-2cd2087g2-l\(u\)ds-7608ni-q2\/8pds-2df6a425x-ael\(t3\)ds-2cd2343g2-i\(u\)ds-7608ni-q1ds-2cd2426g2-ids-2cd2323g2-i\(u\)ds-2dy9236x-a\(t3\)ds-2cd2646g2-izsu\/slds-2td8166-150zh2f\/v2_firmwareds-2td1117-3\/pads-2df8236i5x-aelw_firmwareds-2df8425ix-ael\(t5\)_firmwareds-2cd2346g2-isu\/sl_firmwareds-2cd2547g2-lzsds-2cd2683g2-izs_firmwareds-2td6237-50h4l\/wds-2td6267-50h4l\/wds-2df7225ix-ael\(t3\)ds-2df8225ix-ael\(t5\)_firmwareds-2cd2121g1ds-2df6a236x-ael\(t3\)_firmwareds-2td6266t-50h2lds-2df8225ix-aelw\(t3\)_firmwareds-2cd2326g2-isu\/slds-2td8166-100c2f\/v2_firmwareds-2cd3347g2-ls\(u\)_firmwareds-2cd2547g2-lzs_firmwareds-2cd2021g1-i\(w\)ds-2cd3356g2-is_firmwareds-2cd3356g2-isu\/sl_firmwareds-2dy9236i8x-a_firmwareds-7608ni-q2_firmwareds-2td8167-150zc4f\/w_firmwareds-2df8442ixs-ael\(t5\)_firmwareds-2cd2183g2-i\(u\)ds-2td8167-190ze2f\/wyds-7108ni-q1\/8pds-2td1117-3\/pa_firmwareds-2cd3543g2-isds-2cd3563g2-isds-2cd3056g2iu\/sl_firmwareds-2df8425ix-aelw\(t3\)ids-2sk718mxs-dds-2cd2663g2-izsds-2df7232ix-ael\(t3\)ds-2cd2026g2-iu\/slds-2cd3126g2-isds-2td8167-230zg2f\/wy_firmwareds-2cd2121g1-i\(w\)_firmwareds-2cd2526g2-is_firmwareds-2td6267-100c4l\/w_firmwareds-2cd2046g2-iu\/slds-2cd2621g0-i\(z\)\(s\)_firmwareds-2cd2523g2-i\(u\)_firmwareds-2xe6242f-is\/316l\(b\)ds-2cd3656g2-izs_firmwareds-2cd2526g2-isds-2td8167-150zc4f\/wds-2df8225ih-ael_firmwareds-2cd2387g2-l\(u\)_firmwareds-2cd2047g2-l\(u\)ds-2cd3363g2-iu_firmwareds-2td6267-100c4l\/wyds-2cd2786g2-izs_firmwareds-2cd2383g2-i\(u\)_firmwareds-2cd2166g2-i\(su\)_firmwareds-2dy9250izs-a\(t5\)ds-2df5225x-ae3\(t3\)_firmwareds-2df6a236x-ael\(t3\)ds-7104ni-q1\/4p\/m_firmwareds-2cd3543g2-is_firmwareds-2df8425ix-aelw\(t3\)_firmwareds-2cd3026g2-iu\/slds-2td8166-75c2f\/v2_firmwareds-2cd2543g2-i\(ws\)_firmwareds-2cd3043g2-iuds-2cd2163g2-i\(s\)ds-2cd2421g0-i\(d\)\(w\)_firmwareds-7604ni-q1\/4pds-2td6237-75c4l\/wptz-n4225i-deds-2cd2523g2-i\(u\)ds-2cd2446g2-ids-2cd2387g2-l\(u\)ds-2cd3323g2-iu_firmwareds-7608ni-k1\/8p_firmwareds-2cd2523g2-i\(s\)ds-7104ni-q1ds-2cd3586g2-is_firmwareds-2df7232ix-aelw\(t3\)ds-2cd3047g2-ls_firmwareds-7608ni-k1\/4g_firmwareds-2cd3056g2iu\/slds-2td8167-190ze2f\/wy_firmwareds-2td4137-50\/wds-2td6267-100c4l\/wds-2df5232x-ae3\)t3\)ds-2cd2066g2-i\(u\)ds-2df8436i5x-aelw\(t3\)ds-2df8242i5x-aelw\(t5\)ds-2cd2043g2-i\(u\)ds-2cd2783g2-izs_firmwareds-2cd2123g2-i\(s\)ds-7616ni-q2_firmwareds-2df8a442ixs-ael\(t2\)ds-7104ni-q1\/4p\/mds-2df8242i5x-ael\(t3\)_firmwareds-2cd3126g2-is_firmwareds-2df8242i5x-aelw\(t3\)_firmwareds-2cd3643g2-izsds-2dy9236i8x-a\(t3\)ds-2cd2563g2-i\(s\)_firmwareds-2td4167-25\/w_firmwareds-2cd3547g2-lsds-2cd3363g2-iuds-2td8167-190ze2f\/w_firmwareds-760ni-k1\/4p_firmwareds-2cd3056g2-isds-2df7225ix-aelw\(t3\)_firmwareds-2df5232x-ael\(t3\)ds-2df6a436x-ael\(t3\)_firmwareds-2cd3143g2-i\(s\)u_firmwareds-2cd2023g2-i\(u\)ds-2cd3356g2-is\(u\)ds-2td4136t-9_firmwareids-2vs435-f840-ey_firmwareds-2cd2626g2-izsu\/sl_firmwareds-2dy9250izs-a\(t5\)_firmwareds-2cd3723g2-izsds-2cd2347g2-lsu\/sl_firmwareds-2cd3356g2-isu\/slds-2df8242ix-aelw\(t3\)_firmwareds-2cd2027g2-l\(u\)_firmwareds-2df8425ix-ael\(t3\)ds-2df8a442ixs-af\/sp\(t5\)ds-2cd2321g0-i\/nf_firmwareds-2td6267-75c4l\/wy_firmwareds-2df8225ix-ael\(t3\)_firmwareds-2df5232x-ael\(t3\)_firmwareds-2df8225ix-aelw\(t5\)_firmwareds-2df6a225x-ael\)t3\)ds-2td6266t-50h2l_firmwareds-2cd2121g1_firmwareds-2cd2083g2-i\(u\)_firmwareds-2td8166-100c2f\/v2ds-2dy9240ix-a\(t5\)_firmwareds-7616ni-q1_firmwareds-2cd3656g2-izsds-7108ni-q1\/8p\/m_firmwareds-2cd3726g2-izsds-2cd2027g2-lu\/slds-2cd2086g2-i\(u\)ds-2cd2546g2-i\(s\)ds-2cd2143g2-iuds-2cd3186g2-is\(u\)ds-2cd2763g2-izs_firmwareds-2td6267-75c4l\/wyds-2df8242ix-aely\(t3\)_firmwareds-2cd2026g2-iu\/sl_firmwareds-2cd2743g2-izsds-2td8167-230zg2f\/wyds-2cd3556g2-isds-2td1117-2\/paptz-n2404i-de3_firmwareds-2df5225x-ael\(t3\)ds-7604ni-q1ds-2td8166-150ze2f\/v2_firmwareds-7608ni-q2ds-2cd2426g2-i_firmwareds-2cd2346g2-isu\/slds-2cd3126g2-is\(u\)ds-2cd2527g2-ls_firmwareds-2cd3386g2-is\(u\)_firmwareds-2cd2763g2-izsds-2cd2063g2-i\(u\)_firmwareds-2cd3523g2-isds-2cd3526g2-is_firmwareds-2td8167-190ze2f\/wds-2df8a442ixs-aely\(t5\)ds-2cd2123g2-i\(s\)_firmwareds-2xe6442f-izhrs\(b\)ds-2df8225ix-aelw\(t5\)ds-2df8442ixs-aelw\(t5\)_firmwareds-2td8166-150ze2f\/v2ds-2cd3786g2-izs_firmwareds-2df8425ix-ael\(t3\)_firmwareds-2df8a442nxs-ael\(t5\)_firmwareds-2df5232x-ae3\)t3\)_firmwareds-2df6a425x-ael\(t3\)_firmwareds-2cd3763g2-izs_firmwareids-2pt9a144mxs-d\/t2_firmwareds-2cd2143g2-iu_firmwaren/aSecurity cameras web server
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36705
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.79% / 93.44%
||
7 Day CHG~0.00%
Published-06 Aug, 2021 | 13:19
Updated-04 Aug, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ProLink PRC2402M V1.0.18 and older, the set_TR069 function in the adm.cgi binary, accessible with a page parameter value of TR069 contains a trivial command injection where the value of the TR069_local_port parameter is passed directly to system.

Action-Not Available
Vendor-prolinkn/a
Product-prc2402m_firmwareprc2402mn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2012-2607
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-1.19% / 77.94%
||
7 Day CHG~0.00%
Published-16 Jul, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Johnson Controls CK721-A controller with firmware before SSM4388_03.1.0.14_BB allows remote attackers to perform arbitrary actions via crafted packets to TCP port 41014 (aka the download port).

Action-Not Available
Vendor-johnsoncontrolsn/a
Product-network_controller_firmwarenetwork_controllern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-38882
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.85% / 82.26%
||
7 Day CHG~0.00%
Published-02 Aug, 2024 | 00:00
Updated-05 May, 2025 | 15:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform command line execution through SQL Injection due to improper neutralization of special elements used in an OS command.

Action-Not Available
Vendor-horizoncloudn/ahorizoncloud
Product-catereasen/acaterease
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36287
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-4.68% / 88.90%
||
7 Day CHG~0.00%
Published-08 Apr, 2022 | 19:50
Updated-16 Sep, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to execute commands on the system.

Action-Not Available
Vendor-Dell Inc.
Product-vnxe1600vnx5600vnx5400vnx5800vnx_vg10emc_unity_operating_environmentvnx5200vnx_vg50vnx7600vnx8000VNX2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14476
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.30%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-39228
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.44% / 62.06%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 00:00
Updated-15 Aug, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.

Action-Not Available
Vendor-gl-inetn/agl-inet
Product-mt3000usb150sft1200xe3000_firmwarear300mar300m16_firmwareb2200xe300x750mt1300e750_firmwaresft1200_firmwaremt300n-v2_firmwarea1300ar300m_firmwaree750b1300_firmwares1300x3000mt3000_firmwarear750sx300b_firmwaren300_firmwarear750xe300_firmwareax1800_firmwares1300_firmwarear300m16n300mv1000_firmwaremt2500_firmwareap1300ar750s_firmwareb2200_firmwarex300bmt1300_firmwaremt2500ax1800a1300_firmwaresf1200_firmwaremv1000w_firmwareap1300_firmwaremt6000_firmwaremv1000mt6000b1300mv1000waxt1800_firmwareusb150_firmwaremt300n-v2xe3000sf1200x3000_firmwarex750_firmwareaxt1800ar750_firmwaren/amv1000_firmwaremt2500_firmwarear750s_firmwareb2200_firmwarear300m16_firmwaregl-mt6000_firmwaremt1300_firmwarea1300_firmwaree750_firmwaresf1200_firmwaresft1200_firmwaremv1000w_firmwaremt300n-v2_firmwareap1300_firmwarex750_firmwarear300m_firmwareb1300_firmwareusb150_firmwaremt3000_firmwarex300b_firmwarexe300_firmwaren300_firmwarex3000_firmwares1300_firmwareax1800_firmwarear750_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-3984
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.32% / 86.74%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 17:45
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when the device retrieves updates scripts from the internet.

Action-Not Available
Vendor-amazonAmazon
Product-blink_xt2_sync_module_firmwareblink_xt2_sync_moduleBlink XT2 Sync Module firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-39685
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.63%
||
7 Day CHG-0.13%
Published-22 Jul, 2024 | 15:13
Updated-11 Sep, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py resample function

Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the resample function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier.

Action-Not Available
Vendor-fish.audioFishAudiofishaudio
Product-bert-vits2Bert-VITS2bert-vits2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36380
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-94.27% / 99.93%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 15:53
Updated-30 Jul, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-03-26||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.

Action-Not Available
Vendor-sunhillon/asunhilloSunhillo
Product-surelinen/asurelineSureLine
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14481
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-2.27% / 83.97%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::send_arp function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2006-6427
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.48% / 88.66%
||
7 Day CHG~0.00%
Published-10 Dec, 2006 | 11:00
Updated-07 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Web User Interface in Xerox WorkCentre and WorkCentre Pro before 12.060.17.000, 13.x before 13.060.17.000, and 14.x before 14.060.17.000 allows remote attackers to execute arbitrary commands via unspecified vectors involving "command injection" in (1) the TCP/IP hostname, (2) Scan-to-mailbox folder names, and (3) certain parameters in the Microsoft Networking configuration. NOTE: vector 1 might be the same as CVE-2006-5290.

Action-Not Available
Vendor-n/aXerox Corporation
Product-workcentren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-46454
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-15.67% / 94.44%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 00:00
Updated-02 Aug, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GL.iNET GL-AR300M routers with firmware v4.3.7, it is possible to inject arbitrary shell commands through a crafted package name in the package information functionality.

Action-Not Available
Vendor-gl-inetn/a
Product-gl-ar300mgl-ar300m_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34079
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-10.56% / 92.97%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command injection vulnerability in Mintzo Docker-Tester through 1.2.1 allows attackers to execute arbitrary commands via shell metacharacters in the 'ports' entry of a crafted docker-compose.yml file.

Action-Not Available
Vendor-docker-tester_projectn/a
Product-docker-testern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34082
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-13.69% / 94.00%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command Injection vulnerability in allenhwkim proctree through 0.1.1 and commit 0ac10ae575459457838f14e21d5996f2fa5c7593 for Node.js, allows attackers to execute arbitrary commands via the fix function.

Action-Not Available
Vendor-proctree_projectn/a
Product-proctreen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34080
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-15.12% / 94.32%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command Injection vulnerability in es128 ssl-utils 1.0.0 for Node.js allows attackers to execute arbitrary commands via unsanitized shell metacharacters provided to the createCertRequest() and the createCert() functions.

Action-Not Available
Vendor-ssl-utils_projectn/a
Product-ssl-utilsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34111
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.54% / 93.68%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 02:10
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Thecus 4800Eco was discovered to contain a command injection vulnerability via the username parameter in /adm/setmain.php.

Action-Not Available
Vendor-thecusn/a
Product-n4800econ4800eco_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2012-1795
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.13% / 77.40%
||
7 Day CHG~0.00%
Published-20 Mar, 2012 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

webglimpse.cgi in Webglimpse before 2.20.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the query parameter, as exploited in the wild in March 2012.

Action-Not Available
Vendor-webglimpsen/a
Product-webglimpsen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-36360
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.85% / 82.27%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 04:19
Updated-14 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.

Action-Not Available
Vendor-Keisuke Nakayamakeisuke_nakayama
Product-awkblogawkblog
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-3989
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.40% / 79.66%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 22:38
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when retrieving internal network configuration data.

Action-Not Available
Vendor-amazonn/a
Product-blink_xt2_sync_module_firmwareblink_xt2_sync_moduleAmazon's Blink XT2 Sync Module
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-3929
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-93.99% / 99.88%
||
7 Day CHG-0.05%
Published-30 Apr, 2019 | 20:21
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-06||Apply updates per vendor instructions.

The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.

Action-Not Available
Vendor-barcoblackboxsharpoptomaextroninfocusteqavitCrestron Electronics, Inc.
Product-pn-l703waam-100_firmwaresharelink_250wips710sharelink_200_firmwarewps-proam-100hd_wireless_presentation_systemwepresent_wipg-1600w_firmwareliteshow3_firmwarewepresent_wipg-1600wwepresent_wipg-1000pliteshow4_firmwarepn-l703wa_firmwarehd_wireless_presentation_system_firmwaream-101_firmwarewps-pro_firmwarewips710_firmwaresharelink_250_firmwaresharelink_200liteshow3wepresent_wipg-1000p_firmwareliteshow4am-101Crestron AirMedia, Barco WePresent, Extron ShareLink, Teq AV IT WIPS710, SHARP PN-L703WA, Optoma WPS-Pro, Blackbox HD WPS, InFocus LiteShow3, and InFocus LiteShow4.Multiple Products
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32682
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-93.53% / 99.82%
||
7 Day CHG~0.00%
Published-14 Jun, 2021 | 16:45
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities leading to RCE

elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.

Action-Not Available
Vendor-std42Studio-42
Product-elfinderelFinder
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32974
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.83% / 73.52%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-16 Apr, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moxa NPort IAW5000A-I/O Series Serial Device Server Improper Input Validation

Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to execute commands.

Action-Not Available
Vendor-Moxa Inc.
Product-nport_iaw5150a-12i\/o_firmwarenport_iaw5250a-6i\/onport_iaw5150a-6i\/o_firmwarenport_iaw5150a-6i\/onport_iaw5250a-6i\/o_firmwarenport_iaw5250a-12i\/onport_iaw5150a-12i\/onport_iaw5250a-12i\/o_firmwareNPort IAW5000A-I/O series firmware
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-4473
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-9.8||CRITICAL
EPSS-39.94% / 97.22%
||
7 Day CHG~0.00%
Published-30 Nov, 2023 | 01:40
Updated-13 Feb, 2025 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability in the web server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-nas326nas542_firmwarenas542nas326_firmwareNAS542 firmwareNAS326 firmwarenas326_firmwarenas542_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32673
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-1.80% / 82.01%
||
7 Day CHG~0.00%
Published-08 Jun, 2021 | 17:00
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Command Execution in reg-keygen-git-hash-plugin

reg-keygen-git-hash-plugin is a reg-suit plugin to detect the snapshot key to be compare with using Git commit hash. reg-keygen-git-hash-plugin through and including 0.10.15 allow remote attackers to execute of arbitrary commands. Upgrade to version 0.10.16 or later to resolve this issue.

Action-Not Available
Vendor-reg-keygen-git-hash_projectreg-viz
Product-reg-keygen-git-hashreg-suit
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33055
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-21.78% / 95.53%
||
7 Day CHG~0.00%
Published-30 Aug, 2021 | 18:12
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine ADSelfService Plus through 6102 allows unauthenticated remote code execution in non-English editions.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.Microsoft Corporation
Product-manageengine_adselfservice_pluswindowsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33514
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-24.21% / 95.86%
||
7 Day CHG~0.00%
Published-21 May, 2021 | 22:10
Updated-03 Aug, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-gs710tup_firmwaregc108p_firmwaregs108tv3gs724tpgs110tupgs110tppgs716tppms510txup_firmwaregs752tppms510txupgs728tp_firmwaregs716tp_firmwarems510txm_firmwaregs728tpp_firmwarems510txmgs728tpgs110tpp_firmwaregs752tp_firmwaregc108pgs716tpp_firmwaregs110tpgs752tpgs710tupgc108ppgs724tpp_firmwaregs110tup_firmwaregs724tppgs728tppgc108pp_firmwaregs752tpp_firmwaregs110tp_firmwaregs108t_firmwaregs716tpgs724tp_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32933
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.22% / 45.01%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-16 Apr, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MDT AutoSave Command Injection

An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line in MDT AutoSave versions prior to v6.02.06 and run a command line argument. This could then be leveraged to run a malicious process.

Action-Not Available
Vendor-auvesy-mdtMDT Software
Product-autosaveautosave_for_system_platformA4SPAutoSave for System Platform (A4SP)MDT AutoSave
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-36394
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-9.1||CRITICAL
EPSS-0.21% / 43.25%
||
7 Day CHG~0.00%
Published-06 Jun, 2024 | 08:20
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Action-Not Available
Vendor-SysAid Technologies Ltd.
Product-sysaidSysAidsysaid
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-3739
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-1.12% / 77.35%
||
7 Day CHG+0.47%
Published-13 Apr, 2024 | 18:31
Updated-21 Aug, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cym1102 nginxWebUI upload os command injection

A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-nginxWebUI (cym1102)
Product-nginxwebuinginxWebUInginxwebui
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2005-10003
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-1.39% / 79.56%
||
7 Day CHG~0.00%
Published-17 Oct, 2024 | 14:00
Updated-14 Nov, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mikexstudios Xcomic os command injection

A vulnerability classified as critical has been found in mikexstudios Xcomic up to 0.8.2. This affects an unknown part. The manipulation of the argument cmd leads to os command injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 0.8.3 is able to address this issue. The patch is named 6ed8e3cc336e29f09c7e791863d0559939da98bf. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-mikexstudiosmikexstudios
Product-xcomicXcomic
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-4542
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-92.32% / 99.71%
||
7 Day CHG~0.00%
Published-25 Aug, 2023 | 21:31
Updated-02 Aug, 2024 | 07:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DAR-8000-10 sys1.php os command injection

A vulnerability was found in D-Link DAR-8000-10 up to 20230809. It has been classified as critical. This affects an unknown part of the file /app/sys1.php. The manipulation of the argument cmd with the input id leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238047. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-D-Link Corporation
Product-dar-8000-10dar-8000-10_firmwareDAR-8000-10
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32512
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.17% / 77.83%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:11
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN Storage Manager - Command Injection Following via QuickInstall function

QuickInstall in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

Action-Not Available
Vendor-qsanQSAN
Product-storage_managerStorage Manager
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-31324
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-82.33% / 99.17%
||
7 Day CHG~0.00%
Published-18 May, 2021 | 19:43
Updated-03 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The unprivileged user portal part of CentOS Web Panel is affected by a Command Injection vulnerability leading to root Remote Code Execution.

Action-Not Available
Vendor-control-webpaneln/a
Product-webpaneln/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32531
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.13% / 77.46%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-17 Sep, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN XEVO - Command Injection Following via Init function

OS command injection vulnerability in Init function in QSAN XEVO allows remote attackers to execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.

Action-Not Available
Vendor-qsanQSAN
Product-xevoXEVO
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32305
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.29% / 99.80%
||
7 Day CHG~0.00%
Published-18 May, 2021 | 16:11
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.

Action-Not Available
Vendor-websvnn/a
Product-websvnn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32530
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.01% / 76.17%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-16 Sep, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN XEVO - Command Injection Following via Array function

OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.

Action-Not Available
Vendor-qsanQSAN
Product-xevoXEVO
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3122
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.95% / 93.79%
||
7 Day CHG~0.00%
Published-07 Feb, 2021 | 19:45
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."

Action-Not Available
Vendor-ncrn/a
Product-command_center_agentn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-31698
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.32%
||
7 Day CHG-0.13%
Published-12 Aug, 2021 | 21:33
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Quectel EG25-G devices through 202006130814 allow executing arbitrary code remotely by using an AT command to place shell metacharacters in quectel_handle_fumo_cfg input in atfwd_daemon.

Action-Not Available
Vendor-quecteln/a
Product-eg25-g_firmwareeg25-gn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-36061
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.70% / 71.11%
||
7 Day CHG~0.00%
Published-11 Nov, 2024 | 00:00
Updated-12 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EnGenius EWS356-FIT devices through 1.1.30 allow blind OS command injection. This allows an attacker to execute arbitrary OS commands via shell metacharacters to the Ping and Speed Test utilities.

Action-Not Available
Vendor-n/aengenius
Product-n/aews356_fit
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-30231
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.47%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 15:44
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The api/zrDm/set_ZRElink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the bssaddr, abiaddr, devtoken, devid, elinksync, or elink_proc_enable parameter.

Action-Not Available
Vendor-chinamobilen/a
Product-an_lianbao_wf-1_firmwarean_lianbao_wf-1n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-47901
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-10||CRITICAL
EPSS-2.84% / 85.66%
||
7 Day CHG~0.00%
Published-23 Oct, 2024 | 14:21
Updated-30 Oct, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The web server of affected devices does not sanitize the input parameters in specific GET requests that allow for code execution on operating system level. In combination with other vulnerabilities (CVE-2024-47902, CVE-2024-47903, CVE-2024-47904) this could allow an unauthenticated remote attacker to execute arbitrary code with root privileges.

Action-Not Available
Vendor-Siemens AG
Product-intermesh_7707_fire_subscriberintermesh_7177_hybrid_2.0_subscriberintermesh_7707_fire_subscriber_firmwareInterMesh 7707 Fire SubscriberInterMesh 7177 Hybrid 2.0 Subscriberintermesh_7177_hybrid2.0_subscriberintermesh_7707_fire_subscriber
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-30228
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.47%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 15:44
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The api/ZRAndlink/set_ZRAndlink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iandlink_proc_enable parameter.

Action-Not Available
Vendor-chinamobilen/a
Product-an_lianbao_wf-1_firmwarean_lianbao_wf-1n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-47919
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-9.8||CRITICAL
EPSS-0.85% / 73.94%
||
7 Day CHG~0.00%
Published-30 Dec, 2024 | 09:43
Updated-30 Dec, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tiki Wiki CMS – CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Tiki Wiki CMS – CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Action-Not Available
Vendor-Tiki Wiki
Product-CMS
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-30232
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.47%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 15:44
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The api/ZRIGMP/set_IGMP_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the IGMP_PROXY_WAN_CONNECT parameter.

Action-Not Available
Vendor-chinamobilen/a
Product-an_lianbao_wf-1_firmwarean_lianbao_wf-1n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3029
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.41% / 86.96%
||
7 Day CHG~0.00%
Published-07 Jan, 2021 | 13:55
Updated-03 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has an OS Command Injection vulnerability via shell metacharacters and an IFS manipulation. The parameter "file" on the webpage /showfile.php can be exploited to gain root access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Action-Not Available
Vendor-evolucaren/a
Product-ecs_imagingn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2011-4002
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-3.46% / 87.07%
||
7 Day CHG~0.00%
Published-30 Nov, 2011 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP no Mawashimono Nikki 6.6 and earlier allows remote attackers to execute arbitrary commands via unspecified vectors, related to a "command injection vulnerability."

Action-Not Available
Vendor-mawashimonon/a
Product-nikkin/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-30233
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.47%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 15:44
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The api/ZRIptv/setIptvInfo interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iptv_vlan parameter.

Action-Not Available
Vendor-chinamobilen/a
Product-an_lianbao_wf-1_firmwarean_lianbao_wf-1n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 26
  • 27
  • Next
Details not found