Vulnerabilities (CVE)

Filtered by CWE-78
Total 4696 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-48204 2025-05-21 N/A 6.8 MEDIUM
The ns_backup extension through 13.0.0 for TYPO3 allows command injection.
CVE-2024-51021 1 Netgear 6 R6400v2, R6400v2 Firmware, R7000p and 3 more 2025-05-21 N/A 8.0 HIGH
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a command injection vulnerability via the wan_gateway parameter at genie_fix2.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.
CVE-2024-51010 1 Netgear 8 R6400v2, R6400v2 Firmware, R7000p and 5 more 2025-05-21 N/A 8.0 HIGH
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a command injection vulnerability in the component ap_mode.cgi via the apmode_gateway parameter. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.
CVE-2024-31843 1 Italtel 1 Embrace 2025-05-21 N/A 4.1 MEDIUM
An issue was discovered in Italtel Embrace 1.6.4. The Web application does not properly check the parameters sent as input before they are processed on the server side. This allows authenticated users to execute commands on the Operating System.
CVE-2025-2717 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-05-21 5.8 MEDIUM 4.7 MEDIUM
A vulnerability, which was classified as critical, has been found in D-Link DIR-823X 240126/240802. This issue affects the function sub_41710C of the file /goform/diag_nslookup of the component HTTP POST Request Handler. The manipulation of the argument target_addr leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2022-40929 1 Xuxueli 1 Xxl-job 2025-05-21 N/A 9.8 CRITICAL
XXL-JOB 2.2.0 has a Command execution vulnerability in background tasks. NOTE: this is disputed because the issues/4929 report is about an intended and supported use case (running arbitrary Bash scripts on behalf of users).
CVE-2022-40475 1 Totolink 2 A860r, A860r Firmware 2025-05-21 N/A 9.8 CRITICAL
TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection via the component /cgi-bin/downloadFile.cgi.
CVE-2024-33112 1 Dlink 2 Dir-845l, Dir-845l Firmware 2025-05-21 N/A 7.5 HIGH
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_main()func.
CVE-2024-33343 1 Dlink 2 Dir-822\+, Dir-822\+ Firmware 2025-05-21 N/A 8.8 HIGH
D-Link DIR-822+ V1.0.5 was found to contain a command injection in ChgSambaUserSettings function of prog.cgi, which allows remote attackers to execute arbitrary commands via shell.
CVE-2025-43562 1 Adobe 1 Coldfusion 2025-05-19 N/A 9.1 CRITICAL
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could result in arbitrary code execution in the context of the current user. A high-privileged attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
CVE-2025-32821 1 Sonicwall 12 Sma 100, Sma 100 Firmware, Sma 200 and 9 more 2025-05-19 N/A 7.2 HIGH
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance.
CVE-2025-47203 2025-05-17 N/A 4.5 MEDIUM
dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used.
CVE-2025-2605 1 Honeywell 4 Mb-secure, Mb-secure Firmware, Mb-secure Pro and 1 more 2025-05-17 N/A 9.9 CRITICAL
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Honeywell MB-Secure allows Privilege Abuse. This issue affects MB-Secure: from V11.04 before V12.53 and MB-Secure PRO from V01.06 before V03.09.Honeywell also recommends updating to the most recent version of this product.
CVE-2024-48074 1 Draytek 2 Vigor2960, Vigor2960 Firmware 2025-05-17 N/A 8.0 HIGH
An authorized RCE vulnerability exists in the DrayTek Vigor2960 router version 1.4.4, where an attacker can place a malicious command into the table parameter of the doPPPoE function in the cgi-bin/mainfunction.cgi route, and finally the command is executed by the system function.
CVE-2025-47782 2025-05-16 N/A N/A
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
CVE-2025-32002 2025-05-16 N/A 9.8 CRITICAL
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in I-O DATA network attached hard disk 'HDL-T Series' firmware Ver.1.21 and earlier when 'Remote Link3 function' is enabled. If exploited, a remote unauthenticated attacker may execute an arbitrary OS command.
CVE-2022-24697 1 Apache 1 Kylin 2025-05-16 N/A 9.8 CRITICAL
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.
CVE-2024-10896 1 Logichunt 1 Logo Slider 2025-05-15 N/A 5.4 MEDIUM
The Logo Slider WordPress plugin before 4.5.0 does not sanitise and escape some of its Logo and Slider settings, which could allow high privilege users such as Contributor to perform Stored Cross-Site Scripting
CVE-2023-35723 1 Dlink 2 Dir-x3260, Dir-x3260 Firmware 2025-05-15 N/A 8.8 HIGH
D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the SOAPAction request header provided to the prog.cgi endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20983.
CVE-2023-5677 1 Axis 22 M3024-lve, M3024-lve Firmware, M3025-ve and 19 more 2025-05-15 N/A 6.3 MEDIUM
Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.