Vulnerabilities (CVE)

Filtered by CWE-78
Total 4312 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-18568 1 Dlink 4 Dsr-1000n, Dsr-1000n Firmware, Dsr-250 and 1 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
The D-Link DSR-250 (3.14) DSR-1000N (2.11B201) UPnP service contains a command injection vulnerability, which can cause remote command execution.
CVE-2020-17505 1 Articatech 1 Web Proxy 2024-11-21 9.0 HIGH 8.8 HIGH
Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.
CVE-2020-17456 1 Seowonintech 10 Slc-130, Slc-130 Firmware, Slr-120d42g and 7 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
CVE-2020-17406 1 Microhardcorp 2 Bullet-lte, Bullet-lte Firmware 2024-11-21 9.0 HIGH 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of the ping parameter provided to tools.sh. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10595.
CVE-2020-17384 1 Cellopoint 1 Cellos 2024-11-21 9.0 HIGH 7.2 HIGH
Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With the cookie of the system administrator, attackers can inject and remotely execute arbitrary command to manipulate the system.
CVE-2020-17368 4 Debian, Fedoraproject, Firejail Project and 1 more 4 Debian Linux, Fedora, Firejail and 1 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
CVE-2020-17363 1 Usvn 1 Usvn 2024-11-21 9.0 HIGH 9.9 CRITICAL
USVN (aka User-friendly SVN) before 1.0.9 allows remote code execution via shell metacharacters in the number_start or number_end parameter to LastHundredRequest (aka lasthundredrequestAction) in the Timeline module. NOTE: this may overlap CVE-2020-25069.
CVE-2020-17352 1 Sophos 1 Xg Firewall Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Two OS command injection vulnerabilities in the User Portal of Sophos XG Firewall through 2020-08-05 potentially allow an authenticated attacker to remotely execute arbitrary code.
CVE-2020-17010 1 Microsoft 2 Windows 10, Windows Server 2016 2024-11-21 7.2 HIGH 7.8 HIGH
Win32k Elevation of Privilege Vulnerability
CVE-2020-16282 1 Rangee 1 Rangeeos 2024-11-21 7.2 HIGH 8.8 HIGH
In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.
CVE-2020-16279 1 Rangee 1 Rangeeos 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Kommbox component in Rangee GmbH RangeeOS 8.0.4 is vulnerable to Remote Code Execution due to untrusted user supplied input being passed to the command line without sanitization.
CVE-2020-16257 1 Winstonprivacy 2 Winston, Winston Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
Winston 1.5.4 devices are vulnerable to command injection via the API.
CVE-2020-16205 1 Geutebrueck 22 G-cam Ebc-2110, G-cam Ebc-2110 Firmware, G-cam Ebc-2111 and 19 more 2024-11-21 9.0 HIGH 7.2 HIGH
Using a specially crafted URL command, a remote authenticated user can execute commands as root on the G-Cam and G-Code (Firmware Versions 1.12.0.25 and prior as well as the limited Versions 1.12.13.2 and 1.12.14.5).
CVE-2020-16148 1 Telmat 6 Accesslog, Accesslog Firmware, Educ\@box and 3 more 2024-11-21 9.0 HIGH 7.2 HIGH
The ping page of the administration panel in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via authenticated code injection over the network.
CVE-2020-16147 1 Telmat 6 Accesslog, Accesslog Firmware, Educ\@box and 3 more 2024-11-21 10.0 HIGH 9.8 CRITICAL
The login page in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via Unauthenticated code injection over the network.
CVE-2020-15922 1 Midasolutions 1 Eframework 2024-11-21 10.0 HIGH 9.8 CRITICAL
There is an OS Command Injection in Mida eFramework 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. Authentication is required.
CVE-2020-15920 1 Midasolutions 1 Eframework 2024-11-21 10.0 HIGH 9.8 CRITICAL
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
CVE-2020-15916 1 Tenda 2 Ac15, Ac15 Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
CVE-2020-15893 1 Dlink 2 Dir-816l, Dir-816l Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
CVE-2020-15778 3 Broadcom, Netapp, Openbsd 10 Fabric Operating System, A700s, A700s Firmware and 7 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."