Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
Metrics
Affected Vendors & Products
References
History
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows |
|
| Vendors & Products |
Microsoft
Microsoft windows |
Fri, 02 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 31 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands. | |
| Title | Selea CarPlateServer 4.0.1.6 Remote Program Execution via Configuration Endpoint | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-31T18:39:08.542Z
Updated: 2026-01-02T20:16:14.728Z
Reserved: 2025-12-23T13:21:10.769Z
Link: CVE-2020-36904
Updated: 2026-01-02T20:16:06.256Z
Status : Awaiting Analysis
Published: 2025-12-31T19:15:41.557
Modified: 2025-12-31T20:42:15.637
Link: CVE-2020-36904
No data.