CVE-2020-36897

QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:howfor:qihang_media_web_digital_signage:3.0.9:*:*:*:*:*:*:*

History

17 Dec 2025, 19:17

Type Values Removed Values Added
References () http://www.howfor.com - () http://www.howfor.com - Product
References () https://www.exploit-db.com/exploits/48751 - () https://www.exploit-db.com/exploits/48751 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/qihang-media-web-digital-signage-unauthenticated-remote-code-execution - () https://www.vulncheck.com/advisories/qihang-media-web-digital-signage-unauthenticated-remote-code-execution - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php - Exploit, Third Party Advisory
First Time Howfor
Howfor qihang Media Web Digital Signage
CPE cpe:2.3:a:howfor:qihang_media_web_digital_signage:3.0.9:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

11 Dec 2025, 19:15

Type Values Removed Values Added
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php -

10 Dec 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 21:16

Updated : 2025-12-17 19:17


NVD link : CVE-2020-36897

Mitre link : CVE-2020-36897

CVE.ORG link : CVE-2020-36897


JSON object : View

Products Affected

howfor

  • qihang_media_web_digital_signage
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type