Vulnerabilities (CVE)

Filtered by CWE-78
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-21935 1 Motorola 2 Cx2, Cx2 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
A command injection vulnerability in HNAP1/GetNetworkTomographySettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary code.
CVE-2021-30233 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRIptv/setIptvInfo interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iptv_vlan parameter.
CVE-2021-29369 1 Gnuplot Project 1 Gnuplot 2022-05-03 7.5 HIGH 9.8 CRITICAL
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
CVE-2021-30230 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRFirmware/set_time_zone interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the zonename parameter.
CVE-2021-30231 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/zrDm/set_ZRElink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the bssaddr, abiaddr, devtoken, devid, elinksync, or elink_proc_enable parameter.
CVE-2020-36376 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2021-22125 1 Fortinet 1 Fortisandbox 2022-05-03 9.0 HIGH 7.2 HIGH
An instance of improper neutralization of special elements in the sniffer module of FortiSandbox before 3.2.2 may allow an authenticated administrator to execute commands on the underlying system's shell via altering the content of its configuration file.
CVE-2020-36380 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2021-30232 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRIGMP/set_IGMP_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the IGMP_PROXY_WAN_CONNECT parameter.
CVE-2020-10511 1 Hgiga 1 Oaklouds Ccm\@il 2022-05-03 10.0 HIGH 9.8 CRITICAL
HGiga C&Cmail CCMAILQ before olln-base-6.0-418.i386.rpm and CCMAILN before olln-base-5.0-418.i386.rpm contains insecure configurations. Attackers can exploit these flaws to access unauthorized functionality via a crafted URL.
CVE-2021-3190 1 Async-git Project 1 Async-git 2022-04-29 7.5 HIGH 9.8 CRITICAL
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag.
CVE-2020-7247 4 Canonical, Debian, Fedoraproject and 1 more 4 Ubuntu Linux, Debian Linux, Fedora and 1 more 2022-04-29 10.0 HIGH 9.8 CRITICAL
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
CVE-2020-12641 2 Opensuse, Roundcube 3 Backports Sle, Leap, Webmail 2022-04-29 7.5 HIGH 9.8 CRITICAL
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
CVE-2021-21882 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 8.8 HIGH
An OS command injection vulnerability exists in the Web Manager FsUnmount functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21881 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.9 CRITICAL
An OS command injection vulnerability exists in the Web Manager Wireless Network Scanner functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21884 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.1 CRITICAL
An OS command injection vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21883 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.9 CRITICAL
An OS command injection vulnerability exists in the Web Manager Diagnostics: Ping functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21888 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.1 CRITICAL
An OS command injection vulnerability exists in the Web Manager SslGenerateCertificate functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-24365 1 Gemteks 4 Wrtm-127acn, Wrtm-127acn Firmware, Wrtm-127x9 and 1 more 2022-04-28 9.0 HIGH 8.8 HIGH
An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine. Commands are executed as the root user (uid 0). (Even if a login is required, most routers are left with default credentials.)
CVE-2020-16148 1 Telmat 6 Accesslog, Accesslog Firmware, Educ\@box and 3 more 2022-04-28 9.0 HIGH 7.2 HIGH
The ping page of the administration panel in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via authenticated code injection over the network.
CVE-2020-16147 1 Telmat 6 Accesslog, Accesslog Firmware, Educ\@box and 3 more 2022-04-28 10.0 HIGH 9.8 CRITICAL
The login page in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via Unauthenticated code injection over the network.
CVE-2021-21877 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 6.5 MEDIUM 9.1 CRITICAL
Specially-crafted HTTP requests can lead to arbitrary command execution in “GET” requests. An attacker can make authenticated HTTP requests to trigger this vulnerability.
CVE-2021-21873 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.1 CRITICAL
A specially-crafted HTTP request can lead to arbitrary command execution in RSA keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21872 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.9 CRITICAL
An OS command injection vulnerability exists in the Web Manager Diagnostics: Traceroute functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21874 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.1 CRITICAL
A specially-crafted HTTP request can lead to arbitrary command execution in DSA keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21876 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 6.5 MEDIUM 9.1 CRITICAL
Specially-crafted HTTP requests can lead to arbitrary command execution in PUT requests. An attacker can make authenticated HTTP requests to trigger this vulnerability.
CVE-2021-21875 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2022-04-28 9.0 HIGH 9.1 CRITICAL
A specially-crafted HTTP request can lead to arbitrary command execution in EC keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2021-21805 1 Advantech 1 R-seenet 2022-04-28 10.0 HIGH 9.8 CRITICAL
An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
CVE-2021-4039 1 Zyxel 2 Nwa1100-nh, Nwa1100-nh Firmware 2022-04-28 10.0 HIGH 9.8 CRITICAL
A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.
CVE-2020-13851 1 Pandorafms 1 Pandora Fms 2022-04-27 9.0 HIGH 8.8 HIGH
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
CVE-2021-21414 1 Prisma 1 Prisma 2022-04-26 6.5 MEDIUM 7.2 HIGH
Prisma is an open source ORM for Node.js & TypeScript. As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
CVE-2020-23826 1 Assaabloy 2 Yale Wipc-303w, Yale Wipc-303w Firmware 2022-04-26 6.5 MEDIUM 8.8 HIGH
** DISPUTED ** The Yale WIPC-303W 2.21 through 2.31 camera is vulnerable to remote command execution (RCE) through command injection via the HTTP API. NOTE: This may be a duplicate of CVE-2020-10176 .
CVE-2020-15357 1 Askey 2 Ap5100w, Ap5100w Firmware 2022-04-26 10.0 HIGH 9.8 CRITICAL
Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.
CVE-2020-35665 1 Terra-master 1 Terramaster Operating System 2022-04-26 10.0 HIGH 9.8 CRITICAL
An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.
CVE-2020-35606 1 Webmin 1 Webmin 2022-04-26 9.0 HIGH 8.8 HIGH
Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.
CVE-2020-36198 1 Qnap 1 Malware Remover 2022-04-26 7.2 HIGH 6.7 MEDIUM
A command injection vulnerability has been reported to affect certain versions of Malware Remover. If exploited, this vulnerability allows remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Malware Remover versions prior to 4.6.1.0. This issue does not affect: QNAP Systems Inc. Malware Remover 3.x.
CVE-2020-26300 1 Systeminformation 1 Systeminformation 2022-04-26 7.5 HIGH 9.8 CRITICAL
systeminformation is an npm package that provides system and OS information library for node.js. In systeminformation before version 4.26.2 there is a command injection vulnerability. Problem was fixed in version 4.26.2 with a shell string sanitation fix.
CVE-2021-21289 3 Debian, Fedoraproject, Mechanize Project 3 Debian Linux, Fedora, Mechanize 2022-04-26 7.6 HIGH 8.3 HIGH
Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.
CVE-2022-21668 2 Fedoraproject, Pypa 2 Fedora, Pipenv 2022-04-25 9.3 HIGH 8.6 HIGH
pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.
CVE-2021-32673 1 Reg-keygen-git-hash Project 1 Reg-keygen-git-hash 2022-04-25 7.5 HIGH 9.8 CRITICAL
reg-keygen-git-hash-plugin is a reg-suit plugin to detect the snapshot key to be compare with using Git commit hash. reg-keygen-git-hash-plugin through and including 0.10.15 allow remote attackers to execute of arbitrary commands. Upgrade to version 0.10.16 or later to resolve this issue.
CVE-2013-7285 1 Xstream Project 1 Xstream 2022-04-25 7.5 HIGH 9.8 CRITICAL
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
CVE-2022-0557 1 Microweber 1 Microweber 2022-03-01 9.3 HIGH 7.8 HIGH
OS Command Injection in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-21143 1 Airspan 9 A5x, A5x Firmware, C5c and 6 more 2022-02-26 10.0 HIGH 9.8 CRITICAL
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input on several locations, which may allow an attacker to inject arbitrary commands.
CVE-2021-46319 1 Dlink 2 Dir-846, Dir-846 Firmware 2022-02-25 10.0 HIGH 9.8 CRITICAL
Remote Code Execution (RCE) vulnerability exists in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicious users can use this vulnerability to use "\ " or backticks to bypass the shell metacharacters in the ssid0 or ssid1 parameters to execute arbitrary commands.This vulnerability is due to the fact that CVE-2019-17509 is not fully patched and can be bypassed by using line breaks or backticks on its basis.
CVE-2021-46315 1 Dlink 2 Dir-846, Dir-846 Firmware 2022-02-25 10.0 HIGH 9.8 CRITICAL
Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetWizardConfig.php in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicoius users can use this vulnerability to use "\ " or backticks in the shell metacharacters in the ssid0 or ssid1 parameters to cause arbitrary command execution. Since CVE-2019-17510 vulnerability has not been patched and improved www/hnap1/control/setwizardconfig.php, can also use line breaks and backquotes to bypass.
CVE-2022-22945 1 Vmware 2 Cloud Foundation, Nsx Data Center 2022-02-24 7.2 HIGH 7.8 HIGH
VMware NSX Edge contains a CLI shell injection vulnerability. A malicious actor with SSH access to an NSX-Edge appliance can execute arbitrary commands on the operating system as root.
CVE-2020-28885 1 Liferay 1 Liferay Portal 2022-02-22 9.0 HIGH 7.2 HIGH
** DISPUTED ** Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject commands through the Gogo Shell module to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to access and execute commands in Gogo Shell and therefore not a design flaw
CVE-2020-16846 2 Debian, Saltstack 2 Debian Linux, Salt 2022-02-22 7.5 HIGH 9.8 CRITICAL
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
CVE-2019-20807 5 Apple, Canonical, Debian and 2 more 5 Mac Os X, Ubuntu Linux, Debian Linux and 2 more 2022-02-21 4.6 MEDIUM 5.3 MEDIUM
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
CVE-2017-14535 1 Netfortris 1 Trixbox 2022-02-19 9.0 HIGH 8.8 HIGH
trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.