CVE-2020-36930

SysGauge Server 7.9.18 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\SysGauge Server\bin\sysgaus.exe' to inject malicious executables and escalate privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flexense:sysgauge:7.9.18:*:*:*:*:*:*:*

History

09 Feb 2026, 15:01

Type Values Removed Values Added
First Time Flexense
Flexense sysgauge
CPE cpe:2.3:a:flexense:sysgauge:7.9.18:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/50009 - () https://www.exploit-db.com/exploits/50009 - Exploit
References () https://www.sysgauge.com - () https://www.sysgauge.com - Product
References () https://www.vulncheck.com/advisories/sysgauge-sysgauge-server-unquoted-service-path - () https://www.vulncheck.com/advisories/sysgauge-sysgauge-server-unquoted-service-path - Third Party Advisory

16 Jan 2026, 22:16

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/50009 - () https://www.exploit-db.com/exploits/50009 -

16 Jan 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 00:16

Updated : 2026-02-09 15:01


NVD link : CVE-2020-36930

Mitre link : CVE-2020-36930

CVE.ORG link : CVE-2020-36930


JSON object : View

Products Affected

flexense

  • sysgauge
CWE
CWE-428

Unquoted Search Path or Element