9

CVE-2020-8949

Exploit
Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GocloudS2a Wl Firmware Version4.2.7.16471
   GocloudS2a Wl Version-
GocloudS2a Firmware Version4.2.7.17278
   GocloudS2a Version-
GocloudS2a Firmware Version4.3.0.15815
   GocloudS2a Version-
GocloudS2a Firmware Version4.3.0.17193
   GocloudS2a Version-
GocloudS3a K2p Mtk Firmware Version4.2.7.16528
   GocloudS3a K2p Mtk Version-
GocloudS3a Firmware Version4.3.0.16572
   GocloudS3a Version-
GocloudIsp3000 Firmware Version4.3.0.17190
   GocloudIsp3000 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.78% 0.876
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9 8 10
AV:N/AC:L/Au:S/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.