Логотип exploitDog
bind:CVE-2020-5757
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-5757

Количество 2

Количество 2

nvd логотип

CVE-2020-5757

больше 5 лет назад

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-3f9w-43j6-x43v

больше 3 лет назад

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-5757

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

CVSS3: 9.8
19%
Средний
больше 5 лет назад
github логотип
GHSA-3f9w-43j6-x43v

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

19%
Средний
больше 3 лет назад

Уязвимостей на страницу