Логотип exploitDog
bind:CVE-2020-5758
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-5758

Количество 2

Количество 2

nvd логотип

CVE-2020-5758

больше 5 лет назад

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fc8w-q5c3-5m5f

больше 3 лет назад

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-5758

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.

CVSS3: 8.8
5%
Низкий
больше 5 лет назад
github логотип
GHSA-fc8w-q5c3-5m5f

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API.

5%
Низкий
больше 3 лет назад

Уязвимостей на страницу