Vulnerabilities (CVE)

Filtered by CWE-78
Total 3837 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-25499 1 Totolink 26 A3002r, A3002r Firmware, A3002ru-v1 and 23 more 2021-07-21 9.0 HIGH 8.8 HIGH
TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.
CVE-2020-28426 1 Kill-process-on-port Project 1 Kill-process-on-port 2021-07-21 7.5 HIGH 7.3 HIGH
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
CVE-2020-8797 1 Juplink 2 Rx4-1500, Rx4-1500 Firmware 2021-07-21 6.9 MEDIUM 6.7 MEDIUM
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
CVE-2020-18568 1 Dlink 4 Dsr-1000n, Dsr-1000n Firmware, Dsr-250 and 1 more 2021-07-21 7.5 HIGH 9.8 CRITICAL
The D-Link DSR-250 (3.14) DSR-1000N (2.11B201) UPnP service contains a command injection vulnerability, which can cause remote command execution.
CVE-2020-15477 1 Raspberrytorte 1 Raspberrytortoise 2021-07-21 10.0 HIGH 9.8 CRITICAL
The WebControl in RaspberryTortoise through 2012-10-28 is vulnerable to remote code execution via shell metacharacters in a URI. The file nodejs/raspberryTortoise.js has no validation on the parameter incomingString before passing it to the child_process.exec function.
CVE-2019-17107 1 Centreon 1 Centreon Web 2021-07-21 6.5 MEDIUM 8.8 HIGH
minPlayCommand.php in Centreon Web before 2.8.27 allows authenticated attackers to execute arbitrary code via the command_hostaddress parameter. NOTE: some sources have listed CVE-2019-17017 for this, but that is incorrect.
CVE-2020-16279 1 Rangee 1 Rangeeos 2021-07-21 7.5 HIGH 9.8 CRITICAL
The Kommbox component in Rangee GmbH RangeeOS 8.0.4 is vulnerable to Remote Code Execution due to untrusted user supplied input being passed to the command line without sanitization.
CVE-2020-28429 1 Geojson2kml Project 1 Geojson2kml 2021-07-21 7.5 HIGH 9.8 CRITICAL
All versions of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
CVE-2020-7635 1 Compass-compile Project 1 Compass-compile 2021-07-21 7.5 HIGH 9.8 CRITICAL
compass-compile through 0.0.1 is vulnerable to Command Injection.It allows execution of arbitrary commands via tha options argument.
CVE-2020-24354 1 Zyxel 2 Vmg5313-b30b, Vmg5313-b30b Firmware 2021-07-21 6.5 MEDIUM 8.8 HIGH
Zyxel VMG5313-B30B router on firmware 5.13(ABCJ.6)b3_1127, and possibly older versions of firmware are affected by shell injection.
CVE-2020-24899 1 Nagios 1 Nagios Xi 2021-07-21 6.5 MEDIUM 8.8 HIGH
Nagios XI 5.7.2 is affected by a remote code execution (RCE) vulnerability. An authenticated user can inject additional commands into normal webapp query.
CVE-2020-7206 1 Hp 1 Nagios-plugins-hpilo 2021-07-21 7.5 HIGH 9.8 CRITICAL
HP nagios plugin for iLO (nagios-plugins-hpilo v1.50 and earlier) has a php code injection vulnerability.
CVE-2020-7631 1 Diskusage-ng Project 1 Diskusage-ng 2021-07-21 7.5 HIGH 9.8 CRITICAL
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
CVE-2020-15362 1 Thingssdk 1 Wifiscanner 2021-07-21 7.5 HIGH 9.8 CRITICAL
wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.
CVE-2020-12620 1 Pi-hole 1 Pi-hole 2021-07-21 7.2 HIGH 7.8 HIGH
Pi-hole 4.4 allows a user able to write to /etc/pihole/dns-servers.conf to escalate privileges through command injection (shell metacharacters after an IP address).
CVE-2020-14162 1 Pi-hole 1 Pi-hole 2021-07-21 7.2 HIGH 7.8 HIGH
An issue was discovered in Pi-Hole through 5.0. The local www-data user has sudo privileges to execute the pihole core script as root without a password, which could allow an attacker to obtain root access via shell metacharacters to this script's setdns command.
CVE-2020-25494 1 Xinuos 1 Openserver 2021-07-21 7.5 HIGH 9.8 CRITICAL
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
CVE-2020-14950 1 Aapanel 1 Aapanel 2021-07-21 6.5 MEDIUM 8.8 HIGH
aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary commands via shell metacharacters in a modified /system?action=ServiceAdmin request (start, stop, or restart) to the setting menu of Sotfware Store.
CVE-2019-15310 1 Linkplay 1 Linkplay 2021-07-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.
CVE-2020-26878 1 Commscope 2 Ruckus Iot Module, Ruckus Vriot 2021-07-21 9.0 HIGH 8.8 HIGH
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.