Total
2452 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-6962 | 1 Rdkcentral | 1 Rdkb Ccsppandm | 2020-08-24 | 8.5 HIGH | 7.5 HIGH |
A shell injection issue in cosa_wifi_apis.c in the RDK RDKB-20181217-1 CcspWifiAgent module allows attackers with login credentials to execute arbitrary shell commands under the CcspWifiSsp process (running as root) if the platform was compiled with the ENABLE_FEATURE_MESHWIFI macro. The attack is conducted by changing the Wi-Fi network password to include crafted escape characters. This is related to the WebUI module. | |||||
CVE-2018-14495 | 1 Vivotek | 2 Fd8136, Fd8136 Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
** DISPUTED ** Vivotek FD8136 devices allow Remote Command Injection, aka "another command injection vulnerability in our target device," a different issue than CVE-2018-14494. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance. | |||||
CVE-2019-7301 | 1 Zevenet | 1 Zen Load Balancer | 2020-08-24 | 9.0 HIGH | 7.2 HIGH |
Zen Load Balancer 3.10.1 allows remote authenticated admin users to execute arbitrary commands as root via shell metacharacters in the index.cgi?action=View_Cert certname parameter. | |||||
CVE-2018-14494 | 1 Vivotek | 2 Fd8136, Fd8136 Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
** DISPUTED ** Vivotek FD8136 devices allow Remote Command Injection, related to BusyBox and wget. NOTE: the vendor sent a clarification on 2019-09-17 explaining that, although this CVE was first populated in July 2019, it is a historical vulnerability that does not apply to any current or recent Vivotek hardware or firmware. | |||||
CVE-2019-6487 | 1 Tp-link | 10 Tl-wdr3500, Tl-wdr3500 Firmware, Tl-wdr3600 and 7 more | 2020-08-24 | 6.5 MEDIUM | 8.8 HIGH |
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field. | |||||
CVE-2018-14572 | 1 Pyconuk | 1 Conference-scheduler-cli | 2020-08-24 | 6.8 MEDIUM | 7.8 HIGH |
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. | |||||
CVE-2019-8427 | 1 Zoneminder | 1 Zoneminder | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
daemonControl in includes/functions.php in ZoneMinder before 1.32.3 allows command injection via shell metacharacters. | |||||
CVE-2019-5425 | 1 Ui | 1 Edgeswitch X | 2020-08-24 | 9.0 HIGH | 8.8 HIGH |
In Ubiquiti Networks EdgeSwitch X v1.1.0 and prior, an authenticated user can execute arbitrary shell commands over the SSH interface bypassing the CLI interface, which allow them to escalate privileges to root. | |||||
CVE-2019-9121 | 1 Motorola | 4 C1, C1 Firmware, M2 and 1 more | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetSmartQoSSettings API function, as demonstrated by shell metacharacters in the smartqos_priority_devices field. | |||||
CVE-2018-14772 | 1 Pydio | 1 Pydio | 2020-08-24 | 9.0 HIGH | 7.2 HIGH |
Pydio 4.2.1 through 8.2.1 has an authenticated remote code execution vulnerability in which an attacker with administrator access to the web application can execute arbitrary code on the underlying system via Command Injection. | |||||
CVE-2019-9161 | 1 Xinruidz | 2 Sundray Wan Controller, Sundray Wan Controller Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.) | |||||
CVE-2019-9194 | 1 Std42 | 1 Elfinder | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
elFinder before 2.1.48 has a command injection vulnerability in the PHP connector. | |||||
CVE-2018-14860 | 1 Odoo | 1 Odoo | 2020-08-24 | 9.0 HIGH | 9.1 CRITICAL |
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. | |||||
CVE-2019-9653 | 1 Nuuo | 2 Network Video Recorder, Network Video Recorder Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
NUUO Network Video Recorder Firmware 1.7.x through 3.3.x allows unauthenticated attackers to execute arbitrary commands via shell metacharacters to handle_load_config.php. | |||||
CVE-2019-5167 | 1 Wago | 2 Pfc200 Firmware, Pfc 200 | 2020-08-24 | 7.2 HIGH | 7.8 HIGH |
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). At 0x1e3f0 the extracted dns value from the xml file is used as an argument to /etc/config-tools/edit_dns_server %s dns-server-nr=%d dns-server-name=<contents of dns node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many dns entries will be parsed from the xml file. | |||||
CVE-2018-14893 | 1 Zyxel | 2 Nsa325 V2, Nsa325 V2 Firmware | 2020-08-24 | 9.0 HIGH | 8.8 HIGH |
A system command injection vulnerability in zyshclient in ZyXEL NSA325 V2 version 4.81 allows attackers to execute system commands via the web application API. | |||||
CVE-2018-16408 | 1 D-link | 2 Dir-846, Dir-846 Firmware | 2020-08-24 | 9.0 HIGH | 7.2 HIGH |
D-Link DIR-846 devices with firmware 100.26 allow remote attackers to execute arbitrary code as root via a SetNetworkTomographySettings request by leveraging admin access. | |||||
CVE-2018-16593 | 1 Sony | 105 Kd-43xe7000, Kd-43xe7002, Kd-43xe7003 and 102 more | 2020-08-24 | 8.3 HIGH | 8.8 HIGH |
The Photo Sharing Plus component on Sony Bravia TV through 8.587 devices allows Shell Metacharacter Injection. | |||||
CVE-2018-16618 | 1 Vtech | 9 80-183803, 80-183804, 80-183805 and 6 more | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
VTech Storio Max before 56.D3JM6 allows remote command execution via shell metacharacters in an Android activity name. It exposes the storeintenttranslate.x service on port 1668 listening for requests on localhost. Requests submitted to this service are checked for a string of random characters followed by the name of an Android activity to start. Activities are started by inserting their name into a string that is executed in a shell command. By inserting metacharacters this can be exploited to run arbitrary commands as root. The requests also match those of the HTTP protocol and can be triggered on any web page rendered on the device by requesting resources stored at an http://127.0.0.1:1668/ URI, as demonstrated by the http://127.0.0.1:1668/dacdb70556479813fab2d92896596eef?';{ping,example.org}' URL. | |||||
CVE-2019-3984 | 1 Amazon | 2 Blink Xt2 Sync Module, Blink Xt2 Sync Module Firmware | 2020-08-24 | 10.0 HIGH | 9.8 CRITICAL |
Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when the device retrieves updates scripts from the internet. |