Vulnerabilities (CVE)

Filtered by CWE-77
Total 2537 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-57337 2025-05-30 N/A 6.5 MEDIUM
An arbitrary file upload vulnerability in the opcode 500 functionality of M2Soft CROWNIX Report & ERS v5.x to v5.5.14.1070, v7.x to v7.4.3.960, and v8.x to v8.2.0.345 allows attackers to execute arbitrary code via supplying a crafted file.
CVE-2025-44084 1 Dlink 2 Di-8100, Di-8100g Firmware 2025-05-30 N/A 9.8 CRITICAL
D-link DI-8100 16.07.26A1 is vulnerable to Command Injection. An attacker can exploit this vulnerability by crafting specific HTTP requests, triggering the command execution flaw and gaining the highest privilege shell access to the firmware system.
CVE-2024-22663 1 Totolink 2 A3700r, A3700r Firmware 2025-05-30 N/A 9.8 CRITICAL
TOTOLINK_A3700R_V9.1.2u.6165_20211012has a command Injection vulnerability via setOpModeCfg
CVE-2023-52039 1 Totolink 2 X6000r, X6000r Firmware 2025-05-30 N/A 9.8 CRITICAL
An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415AA4 function.
CVE-2023-52038 1 Totolink 2 X6000r, X6000r Firmware 2025-05-30 N/A 9.8 CRITICAL
An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415C80 function.
CVE-2023-50274 1 Hp 1 Oneview 2025-05-30 N/A 7.8 HIGH
HPE OneView may allow command injection with local privilege escalation.
CVE-2024-22545 1 Trendnet 2 Tew-824dru, Tew-824dru Firmware 2025-05-29 N/A 7.8 HIGH
An issue was discovered in TRENDnet TEW-824DRU version 1.04b01, allows unauthenticated attackers to execute arbitrary code via the system.ntp.server parameter in the sub_420AE0() function. The attack can be launched remotely.
CVE-2023-51833 1 Trendnet 2 Tew-411brpplus, Tew-411brpplus Firmware 2025-05-29 N/A 8.1 HIGH
A command injection issue in TRENDnet TEW-411BRPplus v.2.07_eu that allows a local attacker to execute arbitrary code via the data1 parameter in the debug.cgi page.
CVE-2024-57590 1 Trendnet 2 Tew-632brp, Tew-632brp Firmware 2025-05-29 N/A 9.8 CRITICAL
TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface "ntp_sync.cgi",which allows remote attackers to execute arbitrary commands via parameter "ntp_server" passed to the "ntp_sync.cgi" binary through a POST request.
CVE-2022-37883 1 Arubanetworks 1 Clearpass Policy Manager 2025-05-29 N/A 7.2 HIGH
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities.
CVE-2025-5147 2025-05-29 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in Netcore NBR1005GPEV2, NBR200V2 and B6V2 up to 20250508 and classified as critical. This issue affects the function tools_ping of the file /usr/bin/network_tools. The manipulation of the argument url leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5146 2025-05-29 6.5 MEDIUM 6.3 MEDIUM
A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-12986 1 Draytek 4 Vigor2960, Vigor2960 Firmware, Vigor300b and 1 more 2025-05-28 7.5 HIGH 7.3 HIGH
A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
CVE-2024-48419 1 Edimax 2 Br-6476ac, Br-6476ac Firmware 2025-05-28 N/A 8.8 HIGH
Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 suffers from Command Injection issues in /bin/goahead. Specifically, these issues can be triggered through /goform/tracerouteDiagnosis, /goform/pingDiagnosis, and /goform/fromSysToolPingCmd Each of these issues allows an attacker with access to the web interface to inject and execute arbitrary shell commands, with "root" privileges.
CVE-2024-46089 1 74cms 1 74cms 2025-05-28 N/A 6.3 MEDIUM
74cms <=3.33 is vulnerable to remote code execution (RCE) in the background interface apiadmin.
CVE-2025-1845 1 Esafenet 1 Dsm 2025-05-28 6.5 MEDIUM 6.3 MEDIUM
A vulnerability has been found in ESAFENET DSM 3.1.2 and classified as critical. Affected by this vulnerability is the function examExportPDF of the file /admin/plan/examExportPDF. The manipulation of the argument s leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-49437 1 Tenda 2 Ax12, Ax12 Firmware 2025-05-28 N/A 9.8 CRITICAL
Tenda AX12 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList.
CVE-2023-40301 1 Netscout 1 Ngeniuspulse 2025-05-28 N/A 9.8 CRITICAL
NETSCOUT nGeniusPULSE 3.8 has a Command Injection Vulnerability.
CVE-2022-37881 1 Arubanetworks 1 Clearpass Policy Manager 2025-05-28 N/A 7.2 HIGH
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities.
CVE-2022-37879 1 Arubanetworks 1 Clearpass Policy Manager 2025-05-28 N/A 7.2 HIGH
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities.