VYPR

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

BaseStableLikelihood: High

Description

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Hierarchy (View 1000)

Parents

Children

none

Related attack patterns (CAPEC)

CAPEC-108 · CAPEC-15 · CAPEC-43 · CAPEC-6 · CAPEC-88

CVEs mapped to this weakness (1,367)

page 43 of 69
  • CVE-2025-47228MedJul 5, 2025
    risk 0.47cvss 6.7epss 0.10

    In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), shell injection in the SSH connection settings allows authenticated attackers to execute system commands via crafted HTTP requests.

  • CVE-2025-36529HigJun 27, 2025
    risk 0.47cvss 7.2epss 0.01

    An OS command injection issue exists in multiple versions of TB-eye network recorders and AHD recorders. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who is logging in to the device.

  • CVE-2025-39240HigJun 13, 2025
    risk 0.47cvss 7.2epss 0.01

    Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.

  • CVE-2024-13089HigJun 10, 2025
    risk 0.47cvss 7.2epss 0.01

    An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands. Users with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC. While these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified. This issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability.

  • CVE-2025-24306HigMar 18, 2025
    risk 0.47cvss 7.2epss 0.00

    Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.0_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker with an administrative privilege.

  • CVE-2025-1536HigFeb 21, 2025
    risk 0.47cvss 7.3epss 0.00

    A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

  • CVE-2025-26856HigFeb 20, 2025
    risk 0.47cvss 7.2epss 0.00

    Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If an attacker logs in to the affected product with an administrative account and manipulates requests for a certain screen operation, an arbitrary OS command may be executed. This vulnerability was reported on a different screen operation from CVE-2025-20617.

  • CVE-2024-23690HigFeb 4, 2025
    risk 0.47cvss 7.2epss 0.01

    The end-of-life Netgear FVS336Gv2 and FVS336Gv3 are affected by a command injection vulnerability in the Telnet interface. An authenticated and remote attacker can execute arbitrary OS commands as root over Telnet by sending crafted "util backup_configuration" commands.

  • CVE-2025-20617HigJan 22, 2025
    risk 0.47cvss 7.2epss 0.00

    Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If an attacker logs in to the affected product with an administrative account and manipulates requests for a certain screen operation, an arbitrary OS command may be executed. This vulnerability was reported on a different screen operation from CVE-2025-26856.

  • CVE-2025-0356HigJan 15, 2025
    risk 0.47cvss 7.2epss 0.00

    NEC Corporation Aterm WX1500HP Ver.1.4.2 and earlier and WX3600HP Ver.1.5.3 and earlier allows a attacker to execute arbitrary OS commands via the network.

  • CVE-2025-20016HigJan 14, 2025
    risk 0.47cvss 7.2epss 0.01

    OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340/D440 provided by Y'S corporation. A user with an administrative privilege who logged in to the web management page of the affected product may execute an arbitrary OS command.

  • CVE-2024-54082HigDec 23, 2024
    risk 0.47cvss 7.2epss 0.01

    home 5G HR02 and Wi-Fi STATION SH-54C contain an OS command injection vulnerability in the configuration restore function. An arbitrary OS command may be executed with the root privilege by an administrative user.

  • CVE-2024-45721HigDec 23, 2024
    risk 0.47cvss 7.2epss 0.01

    home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C contain an OS command injection vulnerability in the HOST name configuration screen. An arbitrary OS command may be executed with the root privilege by an administrative user.

  • CVE-2024-53688HigDec 18, 2024
    risk 0.47cvss 7.2epss 0.01

    Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to execute an arbitrary OS command using a crafted HTTP request.

  • CVE-2024-54008HigDec 10, 2024
    risk 0.47cvss 7.2epss 0.02

    An authenticated Remote Code Execution (RCE) vulnerability exists in the AirWave CLI. Successful exploitation of this vulnerability could allow a remote authenticated threat actor to run arbitrary commands as a privileged user on the underlying host.

  • CVE-2024-47133HigDec 5, 2024
    risk 0.47cvss 7.2epss 0.01

    UD-LT1 firmware Ver.2.1.9 and earlier and UD-LT1/EX firmware Ver.2.1.9 and earlier allow a remote authenticated attacker with an administrative account to execute arbitrary OS commands.

  • CVE-2024-11983HigNov 29, 2024
    risk 0.47cvss 7.2epss 0.00

    Certain models of routers from Billion Electric has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject arbitrary system commands into a specific SSH function and execute them on the device.

  • CVE-2024-10653HigNov 1, 2024
    risk 0.47cvss 7.2epss 0.01

    IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrative privileges to inject and execute OS commands on the server.

  • CVE-2024-6333HigOct 17, 2024
    risk 0.47cvss 7.2epss 0.04

    Authenticated Remote Code Execution in Altalink, Versalink & WorkCentre Products.

  • CVE-2024-9139HigOct 14, 2024
    risk 0.47cvss 7.2epss 0.00

    The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.