Filtered by CWE-78
Total 4541 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-0365 1 Riconmobile 4 S9922l, S9922l Firmware, S9922xl and 1 more 2025-04-16 9.1 Critical
The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user.
CVE-2022-21143 1 Airspan 9 A5x, A5x Firmware, C5c and 6 more 2025-04-16 7.5 High
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not properly sanitize user input on several locations, which may allow an attacker to inject arbitrary commands.
CVE-2021-27476 1 Rockwellautomation 1 Factorytalk Assetcentre 2025-04-16 10 Critical
A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for OS command injection. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier.
CVE-2021-32933 1 Auvesy-mdt 2 Autosave, Autosave For System Platform 2025-04-16 10 Critical
An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line in MDT AutoSave versions prior to v6.02.06 and run a command line argument. This could then be leveraged to run a malicious process.
CVE-2021-32974 1 Moxa 8 Nport Iaw5150a-12i\/o, Nport Iaw5150a-12i\/o Firmware, Nport Iaw5150a-6i\/o and 5 more 2025-04-16 9.8 Critical
Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to execute commands.
CVE-2022-1357 1 Cambiumnetworks 1 Cnmaestro 2025-04-16 9.8 Critical
The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.
CVE-2022-1356 1 Cambiumnetworks 1 Cnmaestro 2025-04-16 7.1 High
cnMaestro is vulnerable to a local privilege escalation. By default, a user does not have root privileges. However, a user can run scripts as sudo, which could allow an attacker to gain root privileges when running user scripts outside allowed commands.
CVE-2022-1359 1 Cambiumnetworks 1 Cnmaestro 2025-04-16 5.7 Medium
The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server.
CVE-2022-1360 1 Cambiumnetworks 1 Cnmaestro 2025-04-16 8.2 High
The affected On-Premise cnMaestro is vulnerable to execution of code on the cnMaestro hosting server. This could allow a remote attacker to change server configuration settings.
CVE-2022-1362 1 Cambiumnetworks 1 Cnmaestro 2025-04-16 5 Medium
The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.
CVE-2022-25171 1 P4 Project 1 P4 2025-04-16 7.4 High
The package p4 before 0.0.7 are vulnerable to Command Injection via the run() function due to improper input sanitization
CVE-2019-25024 1 Alleghenycreative 1 Openrepeater 2025-04-16 9.8 Critical
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
CVE-2023-30258 1 Magnussolution 1 Magnusbilling 2025-04-16 9.8 Critical
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
CVE-2025-32778 2025-04-16 N/A
Web-Check is an all-in-one OSINT tool for analyzing any website. A command injection vulnerability exists in the screenshot API of the Web Check project (Lissy93/web-check). The issue stems from user-controlled input (url) being passed unsanitized into a shell command using exec(), allowing attackers to execute arbitrary system commands on the underlying host. This could be exploited by sending crafted url parameters to extract files or even establish remote access. The vulnerability has been patched by replacing exec() with execFile(), which avoids using a shell and properly isolates arguments.
CVE-2023-25699 1 Videowhisper 1 Videowhisper Live Streaming Integration 2025-04-15 9 Critical
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in VideoWhisper.Com VideoWhisper Live Streaming Integration allows OS Command Injection.This issue affects VideoWhisper Live Streaming Integration: from n/a through 5.5.15.
CVE-2022-24431 1 Abacus-ext-cmdline Project 1 Abacus-ext-cmdline 2025-04-15 7.4 High
All versions of package abacus-ext-cmdline are vulnerable to Command Injection via the execute function due to improper user-input sanitization.
CVE-2022-3183 1 Dataprobe 24 Iboot-pdu4-n20, Iboot-pdu4-n20 Firmware, Iboot-pdu4a-n15 and 21 more 2025-04-15 9.8 Critical
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specific function does not sanitize the input provided by the user, which may expose the affected to an OS command injection vulnerability.
CVE-2021-40408 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2025-04-15 9.8 Critical
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->username variable, that has the value of the userName parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection.
CVE-2021-40409 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2025-04-15 9.8 Critical
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->password variable, that has the value of the password parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection.
CVE-2021-40410 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2025-04-15 7.2 High
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection.