Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-24101

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-02 Mar, 2026 | 00:00
Updated At-02 Mar, 2026 | 16:02
Rejected At-
Credits

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:02 Mar, 2026 | 00:00
Updated At:02 Mar, 2026 | 16:02
Rejected At:
â–¼CVE Numbering Authority (CNA)

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tenda.com.cn/material/show/2710
N/A
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101
N/A
Hyperlink: https://www.tenda.com.cn/material/show/2710
Resource: N/A
Hyperlink: https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-78
Description: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101
exploit
Hyperlink: https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101
Resource:
exploit
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:02 Mar, 2026 | 16:16
Updated At:03 Mar, 2026 | 19:44

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Tenda Technology Co., Ltd.
tenda
>>ac15_firmware>>15.03.05.18_multi
cpe:2.3:o:tenda:ac15_firmware:15.03.05.18_multi:*:*:*:*:*:*:*
Tenda Technology Co., Ltd.
tenda
>>ac15>>1.0
cpe:2.3:h:tenda:ac15:1.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-78
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101cve@mitre.org
Exploit
Third Party Advisory
https://www.tenda.com.cn/material/show/2710cve@mitre.org
Product
https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Third Party Advisory
Hyperlink: https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.tenda.com.cn/material/show/2710
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2026-24101
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

2051Records found

CVE-2021-3769
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.58%
||
7 Day CHG~0.00%
Published-30 Nov, 2021 | 09:30
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection in ohmyzsh/ohmyzsh

# Vulnerability in `pygmalion`, `pygmalion-virtualenv` and `refined` themes **Description**: these themes use `print -P` on user-supplied strings to print them to the terminal. All of them do that on git information, particularly the branch name, so if the branch has a specially-crafted name the vulnerability can be exploited. **Fixed in**: [b3ba9978](https://github.com/ohmyzsh/ohmyzsh/commit/b3ba9978). **Impacted areas**: - `pygmalion` theme. - `pygmalion-virtualenv` theme. - `refined` theme.

Action-Not Available
Vendor-planetargonohmyzsh
Product-oh_my_zshohmyzsh/ohmyzsh
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-6047
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-72.97% / 98.77%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 05:48
Updated-30 Oct, 2025 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-05-28||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
GeoVision EOL device - OS Command Injection

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.

Action-Not Available
Vendor-geovisionGeoVisiongeovisionGeoVision
Product-gvlx_4gv-vs03gv-vs2820_firmwaregv-vs21600_firmwaregv-vs2410gv-ebl1100gv-vs03_firmwaregv-vs21600gv-efd1100gv-dsp_lpr_firmwaregv-fd3400gv-vs04hgv-fe3401gv-cb220_firmwaregv-fd2410gv-fd3400_firmwaregv-vs2800_firmwaregv-gm8186_vs14_firmwaregv-vs2800gv-fe420_firmwaregv-vs2820gv-vs14gv-gm8186_vs14gv-dsp_lprgv-bx1500_firmwaregv-bx1500gv-vs04agv-bx130_firmwaregv-vs04h_firmwaregv-cb220gv-fd2410_firmwaregv-vs2410_firmwaregv-ebl1100_firmwaregv-vs04a_firmwaregvlx_4_firmwaregv-efd1100_firmwaregv-fe420gv-bx130gv-fe3401_firmwaregv-vs14_firmwareGV VS04AGV_IPCAMD_GV_BX1500GV_IPCAMD_GV_FD3400GVLX 4 V2GV_IPCAMD_GV_FE3401GV_IPCAMD_GV_CB220GV_VS2410GV VS04HGV_IPCAMD_GV_EFD1100GV_IPCAMD_GV_FE420GV_VS216XXGV_DSP_LPR_V2GV_VS03GV_VS28XXGV_GM8186_VS14GV_IPCAMD_GV_EBL1100GV_IPCAMD_GV_BX130GV_IPCAMD_GV_FD2410GVLX 4 V3GV-VS14_VS14gv-bx1500gv-vs216xxgv-vs04agv-vs03gv-cb220gv-vs2410gv-ebl1100gv-lx_4_v3gv-efd1100gv-lx_4_v2gv-fd3400gv-dsp_lpr_v2gv-vs04hgv-fd3401gv-vs28xxgv-fd2410gv-vs14gv-fe420Multiple Devices
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-37708
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-5.91% / 90.48%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 19:15
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command injection in mail agent settings

Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a command injection vulnerability in mail agent settings. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.

Action-Not Available
Vendor-shopwareshopware
Product-shopwareplatform
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-37344
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-53.60% / 97.95%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 11:32
Updated-04 Aug, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralisation of special elements used in an OS Command (OS Command injection).

Action-Not Available
Vendor-n/aNagios Enterprises, LLC
Product-nagios_xi_switch_wizardn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-6186
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-2.87% / 86.10%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 12:31
Updated-21 Aug, 2025 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ruijie RG-UAC commit.php os command injection

A vulnerability, which was classified as critical, was found in Ruijie RG-UAC 1.0. This affects an unknown part of the file /view/userAuthentication/SSO/commit.php. The manipulation of the argument ad_log_name leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Ruijie Networks Co., Ltd.
Product-rg-uacrg-uac_firmwareRG-UAC
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-57687
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.44% / 80.53%
||
7 Day CHG~0.00%
Published-10 Jan, 2025 | 00:00
Updated-28 Mar, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "Cookie" GET request parameter.

Action-Not Available
Vendor-n/aPHPGurukul LLP
Product-land_record_systemn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36260
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.8||CRITICAL
EPSS-94.44% / 99.99%
||
7 Day CHG~0.00%
Published-22 Sep, 2021 | 12:07
Updated-10 Nov, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-01-24||Apply updates per vendor instructions.

A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

Action-Not Available
Vendor-n/aHIKVISION
Product-ds-2dy92500x-a\(t5\)_firmwareds-2td1117-6\/pa_firmwareds-2cd2046g2-iu\/slds-2cd2123g2-iuds-2td8167-190ze2f\/wyds-2cd2143g2-iu_firmwareds-2td8166-180ze2f\/v2ds-2cd2743g2-izs_firmwareds-2df8236i5x-aelwptz-n4225i-de_firmwareds-2td1217b-3\/pads-2cd3156g2-is\(u\)_firmwareds-2df8a442ixs-ael\(t5\)_firmwareds-2cd3556g2-is_firmwareptz-n2404i-de3ds-2cd2686g2-izsu\/sl_firmwareds-2td6267-75c4l\/w_firmwareds-2cd2783g2-izs_firmwareds-2cd2066g2-iu\/slds-2cd3726g2-izsds-2df7225ix-aelw\(t3\)ds-2dy9236i8x-a\(t3\)_firmwareds-2td8167-190ze2f\/wy_firmwareds-7608ni-q2ds-2cd2121g1-idwds-2cd2786g2-izsds-2cd2147g2-l\(su\)ds-2df8442ixs-aelw\(t5\)ids-2vs435-f840-ey_firmwareds-2xe6242f-is\/316l\(b\)_firmwareds-2cd2346g2-isu\/slds-2cd2766g2-izs_firmwareds-2dyh2a0ixs-d\(t2\)_firmwareds-2td6267-100c4l\/wds-2td8167-230zg2f\/wyds-7616ni-q2_firmwareds-2cd2086g2-iu\/sl_firmwareds-2cd3056g2-is_firmwareds-2cd3143g2-i\(s\)u_firmwareds-2cd2047g2-l\(u\)ds-2cd2586g2-i\(s\)ds-7608ni-k1\/8pds-2cd2123g2-iu_firmwareds-2df8a442ixs-aely\(t5\)_firmwareds-2cd2366g2-isu\/slds-2cd2163g2-i\(s\)ds-2td8166-150ze2f\/v2_firmwareds-2cd3586g2-is_firmwareds-2td6237-50h4l\/w_firmwareds-2td4166t-9_firmwareids-2vs435-f840-ey\(t3\)_firmwareds-2cd3523g2-is_firmwareds-2cd2347g2-lsu\/sl_firmwareds-2cd2163g2-i\(s\)_firmwareds-2df8425ix-aelw\(t5\)_firmwareds-2td6266t-25h2l_firmwareds-2df8242ix-ael\(t5\)ds-2cd3056g2iu\/sl_firmwareds-2cd3743g2-izsds-2df6a825x-ael_firmwareds-2td8167-230zg2f\/w_firmwareds-2df8225ix-ael\(t3\)ds-2cd2086g2-i\(u\)_firmwareds-2cd2563g2-i\(s\)ds-2cd3126g2-isds-7616ni-q2\/16pds-2cd2686g2-izsds-2cd3356g2-isu\/slds-2df7225ix-ael\(t3\)ds-2cd2766g2-izsds-2td6237-50h4l\/wds-2df8a442ixs-aely\(t5\)ds-2td6267-50h4l\/w_firmwareds-2cd2121g0-i\(w\)\(s\)_firmwareds-2td8167-230zg2f\/wy_firmwareds-7104ni-q1\/4p\/mds-2td6237-75c4l\/wds-2df6a436x-aely\(t5\)_firmwareds-2td6236t-50h2lds-2cd3347g2-ls\(u\)ds-2df8436i5x-aelw\(t3\)ids-2sk718mxs-d_firmwareds-2cd2163g2-iuds-7608ni-k1ds-2cd2021g1-i\(w\)ds-7608ni-k1\/4gds-2cd2526g2-isds-2cd2087g2-l\(u\)_firmwareds-2cd2646g2-izsu\/slds-7604ni-k1_firmwareds-2cd2643g2-izs_firmwareds-2cd2366g2-i\(u\)ds-2cd3756g2-izs_firmwareds-2cd2663g2-izs_firmwareds-2cd2147g2-l\(su\)_firmwareds-2xe6422fwd-izhrs_firmwareds-2cd3626g2-izsds-2df6a825x-aelds-7104ni-q1\/4pds-7608ni-q2_firmwareds-2cd3626g2-izs_firmwareds-2cd3363g2-iu_firmwareds-2cd3523g2-isds-2cd2523g2-i\(u\)ds-7108ni-q1\/8p\/m_firmwareds-2cd2183g2-i\(s\)_firmwareds-7604ni-k1ds-2cd2186g2-i\(su\)_firmwareds-2cd2183g2-i\(s\)ds-2df8a442ixs-ael\(t5\)ds-2cd3726g2-izs_firmwareds-2dy9236i8x-a_firmwareds-2cd2343g2-i\(u\)ds-2cd3343g2-iu_firmwareds-7608ni-q1_firmwareds-2cd3343g2-iuds-2cd3126g2-is_firmwareds-2xe6452f-izh\(r\)s_firmwareptz-n4215i-deds-2cd2023g2-i\(u\)ds-2cd3686g2-izsds-7104ni-q1ds-2cd3086g2-isds-2cd3547g2-ls_firmwareds-2td8166-150zh2f\/v2ds-2td8167-230zg2f\/wds-2cd2386g2-i\(u\)_firmwareds-7104ni-q1\/4p_firmwareds-2cd2183g2-i\(u\)ds-2cd2066g2-iu\/sl_firmwareds-2td6266t-50h2lds-2cd2666g2-izs_firmwareds-2cd3123g2-i\(s\)u_firmwareds-2cd3123g2-i\(s\)uds-2df8a842ixs-ael\(t5\)ds-2cd2121g1-idw_firmwareds-2df8236i5x-aelw_firmwareds-2cd2546g2-i\(s\)_firmwareds-2cd3543g2-isds-2cd2566g2-i\(s\)ds-2dy9250izs-a\(t5\)_firmwareds-2cd2386g2-isu\/sl_firmwareds-2cd2763g2-izsds-2dy9240ix-a\(t5\)ds-2df8242i5x-aelw\(t3\)ids-2pt9a144mxs-d\/t2_firmwareds-7616ni-q1ds-2td6266t-25h2lds-2df8225ix-ael\(t5\)_firmwareds-2cd2027g2-l\(u\)_firmwareds-2cd3386g2-is_firmwareds-7616ni-q2\/16p_firmwareds-2df8242ix-aely\(t3\)ds-2cd2546g2-i\(s\)ds-2cd3026g2-isds-2cd3543g2-is_firmwareds-2cd2366g2-i\(u\)_firmwareds-7608ni-q2\/8pds-2cd2626g2-izsu\/sl_firmwareds-2cd2387g2-l\(u\)ds-2cd2021g1-i\(w\)_firmwareds-2td4167-50\/w_firmwareds-7108ni-q1\/8p\/mds-2cd3526g2-is_firmwareds-2cd3723g2-izs_firmwareds-2cd3326g2-isu\/slds-2cd2586g2-i\(s\)_firmwareds-2cd3023g2-iu_firmwareds-2cd2121g1-i\(w\)_firmwareds-2df6a225x-ael\)t3\)ds-2cd2321g0-i\/nfids-2vs435-f840-eyds-2cd3643g2-izsds-7608ni-q1ds-2cd2366g2-isu\/sl_firmwareds-2td8167-190ze2f\/wds-2td8166-100c2f\/v2_firmwareds-2td8167-150zc4f\/w_firmwareds-2cd3043g2-iu_firmwareds-2df8242ix-aelw\(t3\)_firmwareds-7604ni-q1_firmwareds-2df8225ix-aelw\(t3\)ds-2cd2666g2-izsds-2df6a836x-ael\(t5\)ds-2cd3723g2-izsds-2df8225ix-ael\(t5\)ds-2cd2646g2-izsu\/sl_firmwareds-2cd2543g2-i\(ws\)ds-2df8442ixs-ael\(t5\)_firmwareds-2df8425ix-ael\(t5\)ds-2td8167-190ze2f\/w_firmwareds-2td1217b-3\/pa_firmwareds-2cd2786g2-izs_firmwareds-2cd3623g2-izs_firmwareds-2cd3786g2-izs_firmwareds-2cd3056g2-iu\/sl_firmwareds-2cd2023g2-i\(u\)_firmwareds-2df8242i5x-ael\(t3\)_firmwareds-2xe6452f-izh\(r\)sds-2cd2186g2-i\(su\)ptz-n4215-de3_firmwareds-2td4167-25\/wds-2cd3563g2-is_firmwareds-7608ni-k1\/8p\/4g_firmwareds-2cd2621g0-i\(z\)\(s\)_firmwareds-2cd2723g2-izsds-2cd2523g2-i\(u\)_firmwareds-2df6a436x-ael\(t5\)ds-2df6a436x-ael\(t3\)_firmwareptz-n2204i-de3_firmwareds-2td1117-3\/pads-7108ni-q1\/mds-2cd3023g2-iuds-2df5225x-ae3\(t3\)ds-2cd2383g2-i\(u\)_firmwareds-2td4137-25\/wds-7604ni-q1\/4pds-2cd2526g2-is_firmwareds-2xe6242f-is\/316l\(b\)ds-2cd2623g2-izsds-2cd2183g2-iu_firmwareds-2df8225ix-aelw\(t3\)_firmwareds-2cd2683g2-izs_firmwareds-2cd2043g2-i\(u\)_firmwareds-2cd3126g2-is\(u\)ds-2cd3656g2-izs_firmwareds-2df8225ih-aelds-7608ni-k1\/4g_firmwareds-2df8a442ixs-ael\(t2\)_firmwareds-2df7232ix-ael\(t3\)_firmwareds-2df8425ix-ael\(t3\)_firmwareds-2td4167-50\/wds-2cd2583g2-i\(s\)_firmwareds-2df8242i5x-aelw\(t3\)_firmwareds-2cd2383g2-i\(u\)ds-2df5225x-ael\(t3\)ds-2df8242ix-aelw\(t3\)ds-2xe6422fwd-izhrsds-2df8242i5x-ael\(t3\)ds-2td6267-75c4l\/wds-2cd2166g2-i\(su\)_firmwareds-2df8a842ixs-ael\(t5\)_firmwareids-2sk8144ixs-d\/j_firmwareds-2cd3356g2-isds-760ni-k1\/4p_firmwareds-2cd3586g2-isds-2cd2127g2-\(-su\)_firmwareds-2cd2363g2-i\(u\)_firmwareds-2cd3086g2-is_firmwareds-2cd2166g2-i\(su\)ds-2cd2347g2-l\(u\)ds-2cd3547g2-lsds-7108ni-q1_firmwareds-7108ni-q1ds-2cd3563g2-isds-2xe6482f-izhrs_firmwareds-2cd2527g2-ls_firmwareptz-n4215-de3ds-2df8442ixs-aelw\(t2\)_firmwareds-2td8166-150zh2f\/v2_firmwareds-2cd3623g2-izsds-2cd2743g2-izsds-2cd2563g2-i\(s\)_firmwareds-2td4167-25\/w_firmwareds-2cd2063g2-i\(u\)ds-2cd3763g2-izsds-2td1217b-6\/pads-2cd2323g2-i\(u\)_firmwareptz-n4225i-deds-2cd2327g2-l\(u\)_firmwareds-2cd2721g0-i\(z\)\(s\)_firmwareds-2cd2121g0-i\(w\)\(s\)ds-7604ni-q1\/4p_firmwareds-2cd3663g2-izsds-2df8442ixs-aely\(t5\)_firmwareds-2cd2526g2-i\(s\)ds-2dy92500x-a\(t5\)ds-2td6266t-50h2l_firmwareds-2td8166-75c2f\/v2ds-7604ni-k1\/4p\/4gds-2cd2683g2-izsds-2td6237-75c4l\/w_firmwareds-2cd3786g2-izsds-2cd2723g2-izs_firmwareds-7104ni-q1\/mds-2cd2086g2-i\(u\)ds-2cd3643g2-izs_firmwareds-2dy9240ix-a\(t5\)_firmwareds-2cd2123g2-i\(s\)ds-2cd3386g2-is\(u\)ds-2cd2446g2-ids-2cd2363g2-i\(u\)ds-2cd3386g2-is\(u\)_firmwareds-2cd3663g2-izs_firmwareds-2cd2621g0-i\(z\)\(s\)ds-2cd2583g2-i\(s\)ds-2td1117-3\/pa_firmwareds-2cd2686g2-izsu\/slds-2cd2047g2-l\(u\)_firmwareds-7608ni-k1_firmwareds-2df7225ix-aelw\(t3\)_firmwareds-2df6a436x-ael\(t5\)_firmwareds-2cd2426g2-ids-2dy9236i8x-ads-2cd2043g2-i\(u\)ds-2df6a836x-ael\(t5\)_firmwareds-2df8436i5x-aelw\(t3\)_firmwareds-2df5232x-ael\(t3\)_firmwareds-2cd2446g2-i_firmwareds-2df7232ix-aelw\(t3\)ds-2cd2027g2-l\(u\)ds-2cd3056g2-iu\/slds-2cd3347g2-ls\(u\)_firmwareds-7608ni-q1\/8p_firmwareds-2df8225ix-ael\(t3\)_firmwareptz-n4215i-de_firmwareds-2cd2566g2-i\(s\)_firmwareds-2cd3043g2-iuds-2cd3323g2-iu_firmwareds-2df8442ixs-aely\(t5\)ds-2df8a442nxs-ael\(t5\)_firmwareds-2df5232x-ael\(t3\)ds-2cd2063g2-i\(u\)_firmwareds-2df7225ix-ael\(t3\)_firmwareds-7616ni-k1_firmwareds-2cd2386g2-i\(u\)ptz-n5225i-ads-2df8442ixs-aelwy\(t5\)ds-2df6a236x-ael\(t3\)_firmwareds-2dy9250izs-a\(t5\)ds-2cd3323g2-iuds-2df8425ix-ael\(t3\)ds-2cd3026g2-iu\/slds-2cd2127g2-\(-su\)ds-2cd2027g2-lu\/sl_firmwareds-2df5225x-ae3\(t3\)_firmwareds-2df8442ixs-aelw\(t2\)ds-7616ni-k1ds-2cd3156g2-isds-2cd2143g2-i\(s\)ds-2cd3126g2-is\(u\)_firmwareds-2df8225ih-ael\(w\)ds-7616ni-q2ds-2cd2421g0-i\(d\)\(w\)ds-2cd2421g0-i\(d\)w_firmwareds-2cd2086g2-iu\/slds-2df8a442ixs-ael\(t2\)ds-7608ni-q2\/8p_firmwareds-2df5232x-ae3\)t3\)ds-2df6a436x-ael\(t3\)ds-2td6236t-50h2l_firmwareds-2cd3163g2-i\(s\)u_firmwareds-2td8166-180ze2f\/v2_firmwareds-2df6a425x-ael\(t3\)_firmwareds-2df8242i5x-aelw\(t5\)_firmwareds-2cd3047g2-ls_firmwareds-2cd3526g2-isds-2cd2527g2-lsds-2cd2323g2-i\(u\)ds-2cd3026g2-iu\/sl_firmwareds-2df8225ix-aelw\(t5\)_firmwareds-2cd3686g2-izs_firmwareds-2df7232ix-aelw\(t3\)_firmwareds-2df8225ix-aelw\(t5\)ds-2td6267-75c4l\/wyds-2cd2547g2-lzs_firmwareds-2cd2547g2-lzsds-2cd2066g2-i\(u\)_firmwareds-2cd2523g2-i\(s\)ds-7108ni-q1\/8pds-2cd2321g0-i\/nf_firmwareds-2td4137-50\/w_firmwareds-2dyh2a0ixs-d\(t2\)ds-2td8166-75c2f\/v2_firmwareds-2cd2643g2-izsds-2cd3656g2-izsds-7104ni-q1_firmwareds-2df8242ix-aely\(t3\)_firmwareds-2cd2626g2-izsu\/slds-2dy9236ix-a\(t3\)_firmwareds-7104ni-q1\/m_firmwareds-2cd2421g0-i\(d\)wds-2cd2543g2-i\(ws\)_firmwareds-2td4166t-9ds-2dy9236x-a\(t3\)_firmwareds-2df5232x-ae3\)t3\)_firmwareds-2cd3186g2-is\(u\)ds-2cd3047g2-lsds-2df8242i5x-aelw\(t5\)ds-2td8167-150zc4f\/wds-2cd2426g2-i_firmwareds-7608ni-k1\/8p_firmwareds-2td6267-75c4l\/wy_firmwareds-2cd2526g2-i\(s\)_firmwareds-2cd3356g2-is\(u\)_firmwareds-2td4136t-9_firmwareds-2df6a236x-ael\(t3\)ds-2td1117-2\/pa_firmwareds-2cd2186g2-isuds-2df8425ix-ael\(t5\)_firmwareds-2df8442ixs-ael\(t5\)ds-2cd2343g2-i\(u\)_firmwareds-2td6267-100c4l\/wy_firmwareds-2td6267-100c4l\/w_firmwareds-2cd2123g2-i\(s\)_firmwareds-2dy9236ix-a\(t3\)ids-2sk8144ixs-d\/jds-2td6267-100c4l\/wyds-2cd3763g2-izs_firmwareds-2cd3356g2-is\(u\)ds-2cd2026g2-iu\/sl_firmwareds-2cd2547g2-lsds-2cd3756g2-izsds-2cd2523g2-i\(s\)_firmwareds-2cd2143g2-i\(s\)_firmwareds-2dy9236i8x-a\(t3\)ds-2cd3186g2-is\(u\)_firmwareds-2td1117-2\/pads-2cd2666g2-izsu\/sl_firmwareds-2cd2121g1-i\(w\)ds-2cd2186g2-isu_firmwareds-2cd3156g2-is_firmwareids-2vs435-f840-ey\(t3\)ds-7108ni-q1\/m_firmwareds-2cd3326g2-isu\/sl_firmwareds-2cd3163g2-i\(s\)uds-7108ni-q1\/8p_firmwareds-7608ni-k1\/8p\/4gds-2cd2083g2-i\(u\)ds-2cd3363g2-iuds-2df8a442nxs-ael\(t5\)ds-2cd2783g2-izsds-2cd3056g2-isptz-n5225i-a_firmwareds-2cd2387g2-l\(u\)_firmwareids-2pt9a144mxs-d\/t2ds-2df8442ixs-aelwy\(t5\)_firmwareds-2df8a442ixs-af\/sp\(t5\)_firmwareds-2cd3063g2-iuds-2cd2163g2-iu_firmwareds-2cd2326g2-isu\/sl_firmwareds-2cd3386g2-isds-2cd2087g2-l\(u\)ds-2cd2183g2-iuds-2cd2083g2-i\(u\)_firmwareds-2cd2346g2-isu\/sl_firmwareds-2df6a225x-ael\)t3\)_firmwareds-2cd2421g0-i\(d\)\(w\)_firmwareds-2cd2066g2-i\(u\)ds-2df8225ih-ael\(w\)_firmwareds-2df8242ix-ael\(t5\)_firmwareds-7616ni-q1_firmwareds-2cd2027g2-lu\/slds-2cd2347g2-l\(u\)_firmwareds-2xe6442f-izhrs\(b\)ds-2cd2183g2-i\(u\)_firmwareds-2df6a425x-ael\(t3\)ds-2cd2121g1_firmwareds-7604ni-q1ds-2cd3063g2-iu_firmwareptz-n2404i-de3_firmwareds-2df7232ix-ael\(t3\)ds-2xe6442f-izhrs\(b\)_firmwareds-2df6a436x-aely\(t5\)ds-2cd3356g2-is_firmwareds-2cd2327g2-l\(u\)ds-2cd3743g2-izs_firmwareds-760ni-k1\/4pds-2df8250i8x-ael\(t3\)ds-2df8425ix-aelw\(t5\)ds-2cd3056g2iu\/slds-2cd2386g2-isu\/slds-2xe6482f-izhrsds-2dy9236x-a\(t3\)ds-2df8250i8x-ael\(t3\)_firmwareds-2df5225x-ael\(t3\)_firmwareds-2cd2046g2-iu\/sl_firmwareds-2df8442ixs-aelw\(t5\)_firmwareds-2cd2666g2-izsu\/slds-2cd2763g2-izs_firmwareds-2cd2026g2-iu\/slds-2cd2121g1ds-2cd3143g2-i\(s\)uds-2cd3556g2-isds-2td1217b-6\/pa_firmwareds-2cd2143g2-iuds-2cd2326g2-isu\/slds-2cd2663g2-izsds-2cd3026g2-is_firmwareds-2cd2547g2-ls_firmwareds-2td1117-6\/pads-7604ni-k1\/4p\/4g_firmwareds-7104ni-q1\/4p\/m_firmwareds-2td4136t-9ds-2cd2347g2-lsu\/slds-2cd2623g2-izs_firmwareds-2td8166-150ze2f\/v2ptz-n2204i-de3ds-2td4137-25\/w_firmwareds-2td4137-50\/wds-7608ni-q1\/8pds-2cd2686g2-izs_firmwareds-2td6267-50h4l\/wds-2cd3356g2-isu\/sl_firmwareds-2df8425ix-aelw\(t3\)_firmwareds-2cd3156g2-is\(u\)ds-2cd2721g0-i\(z\)\(s\)ds-2df8225ih-ael_firmwareds-2df8425ix-aelw\(t3\)ds-2td8166-100c2f\/v2ds-2df8a442ixs-af\/sp\(t5\)ids-2sk718mxs-dn/aSecurity cameras web server
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-6048
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.06% / 77.41%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 07:28
Updated-01 Aug, 2024 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Openfind MailGates and MailAudit - OS Command Injection

Openfind's MailGates and MailAudit fail to properly filter user input when analyzing email attachments. An unauthenticated remote attacker can exploit this vulnerability to inject system commands and execute them on the remote server.

Action-Not Available
Vendor-Openfindopenfind
Product-MailAudit 6.0MailAudit 5.0MailGates 5.0MailGates 6.0mailgatesmailaudit
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-35394
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.80% / 99.86%
||
7 Day CHG-0.42%
Published-16 Aug, 2021 | 11:07
Updated-07 Nov, 2025 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2021-12-24||Apply updates per vendor instructions.

Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers.

Action-Not Available
Vendor-n/aRealtek Semiconductor Corp.
Product-rtl819x_jungle_software_development_kitn/aJungle Software Development Kit (SDK)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36287
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-2.11% / 83.89%
||
7 Day CHG~0.00%
Published-08 Apr, 2022 | 19:50
Updated-16 Sep, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to execute commands on the system.

Action-Not Available
Vendor-Dell Inc.
Product-vnxe1600vnx5600vnx5400vnx5800vnx_vg10emc_unity_operating_environmentvnx5200vnx_vg50vnx7600vnx8000VNX2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-6187
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-1.93% / 83.18%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 13:00
Updated-21 Aug, 2025 | 00:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ruijie RG-UAC sub_commit.php os command injection

A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Ruijie Networks Co., Ltd.
Product-rg-uacrg-uac_firmwareRG-UACrg-uac
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32531
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.44% / 80.51%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-17 Sep, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN XEVO - Command Injection Following via Init function

OS command injection vulnerability in Init function in QSAN XEVO allows remote attackers to execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.

Action-Not Available
Vendor-qsanQSAN
Product-xevoXEVO
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36380
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.64% / 99.84%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 15:53
Updated-05 Nov, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-03-26||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.

Action-Not Available
Vendor-sunhillon/asunhilloSunhillo
Product-surelinen/asurelineSureLine
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-57595
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.50% / 80.95%
||
7 Day CHG~0.00%
Published-27 Jan, 2025 | 00:00
Updated-27 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter "wps_pin" passed to the apc_client_pin.cgi binary through a POST request.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34080
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-14.69% / 94.38%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command Injection vulnerability in es128 ssl-utils 1.0.0 for Node.js allows attackers to execute arbitrary commands via unsanitized shell metacharacters provided to the createCertRequest() and the createCert() functions.

Action-Not Available
Vendor-ssl-utils_projectn/a
Product-ssl-utilsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34111
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.01% / 88.29%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 02:10
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Thecus 4800Eco was discovered to contain a command injection vulnerability via the username parameter in /adm/setmain.php.

Action-Not Available
Vendor-thecusn/a
Product-n4800econ4800eco_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33990
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-49.86% / 97.77%
||
7 Day CHG~0.00%
Published-16 Apr, 2023 | 00:00
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Liferay Portal 6.2.5 allows Command=FileUpload&Type=File&CurrentFolder=/ requests when frmfolders.html exists. NOTE: The vendor disputes this issue because the exploit reference link only shows frmfolders.html is accessible and does not demonstrate how an unauthorized user can upload a file.

Action-Not Available
Vendor-n/aLiferay Inc.
Product-liferay_portaln/aportal
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2021-34082
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-13.29% / 94.05%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command Injection vulnerability in allenhwkim proctree through 0.1.1 and commit 0ac10ae575459457838f14e21d5996f2fa5c7593 for Node.js, allows attackers to execute arbitrary commands via the fix function.

Action-Not Available
Vendor-proctree_projectn/a
Product-proctreen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34348
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.90% / 75.40%
||
7 Day CHG~0.00%
Published-27 Sep, 2021 | 00:45
Updated-16 Sep, 2024 | 22:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability in QVR

A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qvrQVR
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-34084
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-14.69% / 94.38%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection vulnerability in Turistforeningen node-s3-uploader through 2.0.3 for Node.js allows attackers to execute arbitrary commands via the metadata() function.

Action-Not Available
Vendor-s3-uploader_projectn/a
Product-s3-uploadern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34351
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.21% / 78.84%
||
7 Day CHG~0.00%
Published-27 Sep, 2021 | 00:45
Updated-16 Sep, 2024 | 22:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability in QVR

A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qvrQVR
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-34352
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-4.18% / 88.55%
||
7 Day CHG~0.00%
Published-01 Oct, 2021 | 02:50
Updated-17 Sep, 2024 | 00:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection Vulnerability in QVR

A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210902 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qvrQVR
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-34079
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-10.24% / 93.05%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS Command injection vulnerability in Mintzo Docker-Tester through 1.2.1 allows attackers to execute arbitrary commands via shell metacharacters in the 'ports' entry of a crafted docker-compose.yml file.

Action-Not Available
Vendor-docker-tester_projectn/a
Product-docker-testern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33962
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.83% / 87.99%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 11:49
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

China Mobile An Lianbao WF-1 router v1.0.1 is affected by an OS command injection vulnerability in the web interface /api/ZRUsb/pop_usb_device component.

Action-Not Available
Vendor-chinamobileltdn/a
Product-an_lianbao_wf-1an_lianbao_wf_firmware-1n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33841
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-10||CRITICAL
EPSS-1.48% / 80.77%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:50
Updated-16 Sep, 2024 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Circutor SGE-PLC1000 OS command Injection

SGE-PLC1000 device, in its 0.9.2b firmware version, does not handle some requests correctly, allowing a remote attacker to inject code into the operating system with maximum privileges.

Action-Not Available
Vendor-circutorCircutor
Product-sge-plc1000_firmwaresge-plc1000SGE-PLC1000
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33055
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-21.78% / 95.66%
||
7 Day CHG~0.00%
Published-30 Aug, 2021 | 18:12
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine ADSelfService Plus through 6102 allows unauthenticated remote code execution in non-English editions.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.Microsoft Corporation
Product-manageengine_adselfservice_pluswindowsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32513
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.17% / 78.51%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:11
Updated-16 Sep, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN Storage Manager - Command Injection Following via QsanTorture function

QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

Action-Not Available
Vendor-qsanQSAN
Product-storage_managerStorage Manager
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32933
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.30% / 52.67%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-16 Apr, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MDT AutoSave Command Injection

An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line in MDT AutoSave versions prior to v6.02.06 and run a command line argument. This could then be leveraged to run a malicious process.

Action-Not Available
Vendor-auvesy-mdtMDT Software
Product-autosaveautosave_for_system_platformA4SPAutoSave for System Platform (A4SP)MDT AutoSave
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32512
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.17% / 78.51%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:11
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN Storage Manager - Command Injection Following via QuickInstall function

QuickInstall in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.

Action-Not Available
Vendor-qsanQSAN
Product-storage_managerStorage Manager
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32534
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 67.28%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-17 Sep, 2024 | 01:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN SANOS - Command Injection

QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.

Action-Not Available
Vendor-qsanQSAN
Product-sanosSANOS
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33191
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-3.34% / 87.13%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 11:20
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MiNiFi CPP arbitrary script execution is possible on the agent's host machine through the c2 protocol

From Apache NiFi MiNiFi C++ version 0.5.0 the c2 protocol implements an "agent-update" command which was designed to patch the application binary. This "patching" command defaults to calling a trusted binary, but might be modified to an arbitrary value through a "c2-update" command. Said command is then executed using the same privileges as the application binary. This was addressed in version 0.10.0

Action-Not Available
Vendor-The Apache Software Foundation
Product-nifi_minifi_c\+\+Apache NiFi - MiNiFi C++
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32530
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.28% / 79.40%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-16 Sep, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN XEVO - Command Injection Following via Array function

OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.

Action-Not Available
Vendor-qsanQSAN
Product-xevoXEVO
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32682
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-92.77% / 99.76%
||
7 Day CHG~0.00%
Published-14 Jun, 2021 | 16:45
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities leading to RCE

elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.

Action-Not Available
Vendor-std42Studio-42
Product-elfinderelFinder
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32533
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 67.28%
||
7 Day CHG~0.00%
Published-07 Jul, 2021 | 14:12
Updated-16 Sep, 2024 | 21:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QSAN SANOS - Command Injection

The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.

Action-Not Available
Vendor-qsanQSAN
Product-sanosSANOS
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3342
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-5.12% / 89.71%
||
7 Day CHG+1.61%
Published-01 Mar, 2021 | 21:01
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted LaTeX input to a cgi/latex2png?latex= URI.

Action-Not Available
Vendor-eprintsn/a
Product-eprintsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-31915
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 36.67%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 12:12
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2020.2.4, OS command injection leading to remote code execution was possible.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-teamcityn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3122
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-88.60% / 99.50%
||
7 Day CHG+1.51%
Published-07 Feb, 2021 | 19:45
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."

Action-Not Available
Vendor-ncrn/a
Product-command_center_agentn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32090
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 63.27%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 03:52
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter.

Action-Not Available
Vendor-localstackn/a
Product-localstackn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-31580
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-8.7||HIGH
EPSS-0.90% / 75.41%
||
7 Day CHG+0.03%
Published-22 Jul, 2021 | 18:27
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Akkadian Provisioning Manager Engine (PME) Shell Escape via 'exec' command

The restricted shell provided by Akkadian Provisioning Manager Engine (PME) can be bypassed by switching the OpenSSH channel from `shell` to `exec` and providing the ssh client a single execution parameter. This issue was resolved in Akkadian OVA appliance version 3.0 (and later), Akkadian Provisioning Manager 5.0.2 (and later), and Akkadian Appliance Manager 3.3.0.314-4a349e0 (and later).

Action-Not Available
Vendor-Akkadian Labs, LLC
Product-provisioning_managerova_applianceProvisioning Manager Engine (PME)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-27804
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-8||HIGH
EPSS-0.76% / 73.09%
||
7 Day CHG~0.00%
Published-25 Oct, 2022 | 16:33
Updated-15 Apr, 2025 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An os command injection vulnerability exists in the web interface util_set_abode_code functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-goabodeabode systems, inc.
Product-iota_all-in-one_security_kitiota_all-in-one_security_kit_firmwareiota All-In-One Security Kit
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28171
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-7.5||HIGH
EPSS-84.10% / 99.30%
||
7 Day CHG~0.00%
Published-27 Jun, 2022 | 17:48
Updated-16 Sep, 2024 | 17:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.

Action-Not Available
Vendor-HIKVISION
Product-ds-a80624s_firmwareds-a80316sds-a81016s_firmwareds-a81016sds-a71072r_firmwareds-a71024_firmwareds-a72072r_firmwareds-a71024ds-a72024_firmwareds-a80316s_firmwareds-a72048r-cvsds-a82024d_firmwareds-a72048r-cvs_firmwareds-a82024dds-a71072rds-a71048r-cvs_firmwareds-a80624sds-a71048r-cvsds-a71048ds-a72072rds-a71048_firmwareds-a72024DS-A71024/48R-CVS,DS-A72024/48R-CVSDS-A71024/48/72R,DS-A80624S,DS-A81016S,DS-A72024/72R,DS-A80316S,DS-A82024D
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-3190
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.94% / 95.55%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 07:11
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag.

Action-Not Available
Vendor-async-git_projectn/a
Product-async-gitn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-46510
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.29%
||
7 Day CHG~0.00%
Published-27 Oct, 2023 | 00:00
Updated-12 Sep, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in ZIONCOM (Hong Kong) Technology Limited A7000R v.4.1cu.4154 allows an attacker to execute arbitrary code via the cig-bin/cstecgi.cgi to the settings/setPasswordCfg function.

Action-Not Available
Vendor-zioncomn/azioncom
Product-a7000r_firmwarea7000rn/aa7000r
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-33357
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-92.88% / 99.77%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 17:51
Updated-03 Aug, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-raspapn/a
Product-raspapn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2011-2195
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.42% / 87.28%
||
7 Day CHG~0.00%
Published-26 Oct, 2021 | 12:10
Updated-06 Aug, 2024 | 22:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in WebSVN 2.3.2. Without prior authentication, if the 'allowDownload' option is enabled in config.php, an attacker can invoke the dl.php script and pass a well formed 'path' argument to execute arbitrary commands against the underlying operating system.

Action-Not Available
Vendor-websvnn/a
Product-websvnwebsvn
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32305
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-92.35% / 99.73%
||
7 Day CHG-0.83%
Published-18 May, 2021 | 16:11
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.

Action-Not Available
Vendor-websvnn/a
Product-websvnn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-52803
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-2.41% / 84.91%
||
7 Day CHG~0.00%
Published-21 Nov, 2024 | 16:53
Updated-27 Aug, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LLama Factory Remote OS Command Injection Vulnerability

LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises from improper handling of user input, allowing malicious actors to execute arbitrary OS commands on the host system. The issue is caused by insecure usage of the `Popen` function with `shell=True`, coupled with unsanitized user input. Immediate remediation is required to mitigate the risk. This vulnerability is fixed in 0.9.1.

Action-Not Available
Vendor-hiyougahiyougallama-factory
Product-llama-factoryLLaMA-Factoryllama-factory
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-27005
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-45.94% / 97.58%
||
7 Day CHG~0.00%
Published-15 Mar, 2022 | 21:56
Updated-12 Sep, 2024 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the setWanCfg function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a7000r_firmwarex5000r_firmwarex5000ra7000rn/aa7000r_firmwarex5000r_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-27273
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.34% / 79.87%
||
7 Day CHG~0.00%
Published-10 Apr, 2022 | 20:23
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_12168. This vulnerability is triggered via a crafted packet.

Action-Not Available
Vendor-n/aInHand Networks, Inc.
Product-inrouter_900_firmwareinrouter_900n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-52723
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.23% / 45.65%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 00:00
Updated-13 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TOTOLINK X6000R V9.4.0cu.1041_B20240224 in the shttpd file, the Uci_Set Str function is used without strict parameter filtering. An attacker can achieve arbitrary command execution by constructing the payload.

Action-Not Available
Vendor-n/aTOTOLINK
Product-x6000r_firmwarex6000rn/ax6000r_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • ...
  • 16
  • 17
  • 18
  • ...
  • 41
  • 42
  • Next
Details not found