Vulnerabilities (CVE)

Filtered by CWE-77
Total 2296 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39780 1 Asus 2 Rt-ax55, Rt-ax55 Firmware 2024-11-21 N/A 8.8 HIGH
ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability.
CVE-2023-39638 1 Dlink 2 Dir-859 A1, Dir-859 A1 Firmware 2024-11-21 N/A 9.8 CRITICAL
D-LINK DIR-859 A1 1.05 and A1 1.06B01 Beta01 was discovered to contain a command injection vulnerability via the lxmldbc_system function at /htdocs/cgibin.
CVE-2023-39637 1 Dlink 2 Dir-816, Dir-816 Firmware 2024-11-21 N/A 9.8 CRITICAL
D-Link DIR-816 A2 1.10 B05 was discovered to contain a command injection vulnerability via the component /goform/Diagnosis.
CVE-2023-39618 1 Totolink 2 X5000r, X5000r Firmware 2024-11-21 N/A 9.8 CRITICAL
TOTOLINK X5000R B20210419 was discovered to contain a remote code execution (RCE) vulnerability via the setTracerouteCfg interface.
CVE-2023-39617 1 Totolink 2 X5000r, X5000r Firmware 2024-11-21 N/A 9.8 CRITICAL
TOTOLINK X5000R_V9.1.0cu.2089_B20211224 and X5000R_V9.1.0cu.2350_B20230313 were discovered to contain a remote code execution (RCE) vulnerability via the lang parameter in the setLanguageCfg function.
CVE-2023-39523 1 Nexb 1 Scancode.io 2024-11-21 N/A 6.8 MEDIUM
ScanCode.io is a server to script and automate software composition analysis with ScanPipe pipelines. Prior to version 32.5.1, the software has a possible command injection vulnerability in the docker fetch process as it allows to append malicious commands in the `docker_reference` parameter. In the function `scanpipe/pipes/fetch.py:fetch_docker_image` the parameter `docker_reference` is user controllable. The `docker_reference` variable is then passed to the vulnerable function `get_docker_image_platform`. However, the `get_docker_image_plaform` function constructs a shell command with the passed `docker_reference`. The `pipes.run_command` then executes the shell command without any prior sanitization, making the function vulnerable to command injections. A malicious user who is able to create or add inputs to a project can inject commands. Although the command injections are blind and the user will not receive direct feedback without logs, it is still possible to cause damage to the server/container. The vulnerability appears for example if a malicious user adds a semicolon after the input of `docker://;`, it would allow appending malicious commands. Version 32.5.1 contains a patch for this issue. The `docker_reference` input should be sanitized to avoid command injections and, as a workaround, one may avoid creating commands with user controlled input directly.
CVE-2023-39509 1 Bosch 4 Cpp13, Cpp13 Firmware, Cpp14 and 1 more 2024-11-21 N/A 7.2 HIGH
A command injection vulnerability exists in Bosch IP cameras that allows an authenticated user with administrative rights to run arbitrary commands on the OS of the camera.
CVE-2023-39362 2 Cacti, Fedoraproject 2 Cacti, Fedora 2024-11-21 N/A 7.2 HIGH
Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-39293 1 Mitel 3 Mivoice Office 400, Mivoice Office 400 Smb Controller, Mivoice Office 400 Smb Controller Firmware 2024-11-21 N/A 9.8 CRITICAL
A Command Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to execute arbitrary commands within the context of the system.
CVE-2023-39008 1 Opnsense 1 Opnsense 2024-11-21 N/A 9.8 CRITICAL
A command injection vulnerability in the component /api/cron/settings/setJob/ of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary system commands.
CVE-2023-39001 1 Opnsense 1 Opnsense 2024-11-21 N/A 9.8 CRITICAL
A command injection vulnerability in the component diag_backup.php of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary commands via a crafted backup configuration file.
CVE-2023-38942 1 Dango 1 Dango-translator 2024-11-21 N/A 9.8 CRITICAL
Dango-Translator v4.5.5 was discovered to contain a remote command execution (RCE) vulnerability via the component app/config/cloud_config.json.
CVE-2023-38941 1 Ehco1996 1 Django-sspanel 2024-11-21 N/A 9.8 CRITICAL
django-sspanel v2022.2.2 was discovered to contain a remote command execution (RCE) vulnerability via the component sspanel/admin_view.py -> GoodsCreateView._post.
CVE-2023-38928 1 Netgear 2 R7100lg, R7100lg Firmware 2024-11-21 N/A 9.8 CRITICAL
Netgear R7100LG 1.0.0.78 was discovered to contain a command injection vulnerability via the password parameter at usb_remote_invite.cgi.
CVE-2023-38921 1 Netgear 4 Wag302v2, Wag302v2 Firmware, Wg302v2 and 1 more 2024-11-21 N/A 8.8 HIGH
Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameters.
CVE-2023-38902 1 Ruijie 192 Rg-eap101, Rg-eap101 Firmware, Rg-eap101 V2 and 189 more 2024-11-21 N/A 8.8 HIGH
A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field.
CVE-2023-38866 1 Comfast 2 Cf-xr11, Cf-xr11 Firmware 2024-11-21 N/A 9.8 CRITICAL
COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_415588. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter interface and display_name.
CVE-2023-38865 1 Comfast 2 Cf-xr11, Cf-xr11 Firmware 2024-11-21 N/A 9.8 CRITICAL
COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_4143F0. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter timestr.
CVE-2023-38864 1 Comfast 2 Cf-xr11, Cf-xr11 Firmware 2024-11-21 N/A 9.8 CRITICAL
An issue in COMFAST CF-XR11 v.2.7.2 allows an attacker to execute arbitrary code via the protal_delete_picname parameter in the sub_41171C function at bin/webmgnt.
CVE-2023-38863 1 Comfast 2 Cf-xr11, Cf-xr11 Firmware 2024-11-21 N/A 9.8 CRITICAL
An issue in COMFAST CF-XR11 v.2.7.2 allows an attacker to execute arbitrary code via the ifname and mac parameters in the sub_410074 function at bin/webmgnt.