Vulnerabilities (CVE)

Filtered by CWE-77
Total 2551 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-10634 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-10814 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was determined in D-Link DIR-823X 240126/240802/250416. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/goahead. This manipulation of the argument port causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-10401 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2025-29887 1 Qnap 1 Qurouter 2025-09-24 N/A 7.2 HIGH
A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.5.1.060 and later
CVE-2025-20334 2025-09-24 N/A 8.8 HIGH
A vulnerability in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
CVE-2021-4406 1 Osnexus 1 Quantastor 2025-09-24 N/A 9.1 CRITICAL
An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user.
CVE-2025-55319 1 Microsoft 1 Visual Studio Code 2025-09-24 N/A 8.8 HIGH
Ai command injection in Agentic AI and Visual Studio Code allows an unauthorized attacker to execute code over a network.
CVE-2024-52325 1 Ecovacs 24 Deebot T30 Omni, Deebot T30 Omni Firmware, Deebot T30s and 21 more 2025-09-23 N/A 9.6 CRITICAL
ECOVACS robot lawnmowers and vacuums are vulnerable to command injection via SetNetPin() over an unauthenticated BLE connection.
CVE-2025-22481 1 Qnap 2 Qts, Quts Hero 2025-09-23 N/A 8.8 HIGH
A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.4.3079 build 20250321 and later QuTS hero h5.2.4.3079 build 20250321 and later
CVE-2025-10774 2025-09-23 5.8 MEDIUM 4.7 MEDIUM
A weakness has been identified in Ruijie 6000-E10 up to 2.4.3.6-20171117. This affects an unknown part of the file /view/vpn/autovpn/sub_commit.php. This manipulation of the argument key causes os command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-10767 2025-09-22 3.5 LOW 4.5 MEDIUM
A vulnerability was detected in CosmodiumCS OnlyRAT up to 3.2. The affected element is the function connect/remote_upload/remote_download of the file main.py of the component Configuration File Handler. The manipulation of the argument configuration["PASSWORD"] results in os command injection. The attack requires a local approach. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-43953 2025-09-22 N/A 8.8 HIGH
In 2wcom IP-4c 2.16, the web interface allows admin and manager users to execute arbitrary code as root via a ping or traceroute field on the TCP/IP screen.
CVE-2025-10628 1 Dlink 2 Dir-852, Dir-852 Firmware 2025-09-22 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in D-Link DIR-852 1.00CN B09. This vulnerability affects unknown code of the file /htdocs/cgibin/hedwig.cgi of the component Web Management Interface. Performing manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-10629 1 Dlink 2 Dir-852, Dir-852 Firmware 2025-09-22 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was determined in D-Link DIR-852 1.00CN B09. This issue affects the function ssdpcgi_main of the file htodcs/cgibin of the component Simple Service Discovery Protocol Service. Executing manipulation of the argument ST can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-30264 1 Qnap 2 Qts, Quts Hero 2025-09-22 N/A 8.8 HIGH
A command injection vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.5.3145 build 20250526 and later QuTS hero h5.2.5.3138 build 20250519 and later
CVE-2024-38644 1 Qnap 1 Notes Station 3 2025-09-20 N/A 8.8 HIGH
An OS command injection vulnerability has been reported to affect Notes Station 3. If exploited, the vulnerability could allow remote authenticated attackers to execute commands. We have already fixed the vulnerability in the following version: Notes Station 3 3.9.7 and later
CVE-2024-53692 1 Qnap 2 Qts, Quts Hero 2025-09-20 N/A 4.7 MEDIUM
A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
CVE-2025-59376 1 Feisky 1 Mcp-kubernetes-server 2025-09-20 N/A 3.7 LOW
feiskyer mcp-kubernetes-server through 0.1.11 does not consider chained commands in the implementation of --disable-write and --disable-delete, e.g., it allows a "kubectl version; kubectl delete pod" command because the first word (i.e., "version") is not a write or delete operation.
CVE-2025-52053 1 Totolink 2 X6000r, X6000r Firmware 2025-09-20 N/A 9.8 CRITICAL
TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.
CVE-2025-56706 1 Edimax 2 Br-6473ax, Br-6473ax Firmware 2025-09-19 N/A 8.0 HIGH
Edimax BR-6473AX v1.0.28 was discovered to contain a remote code execution (RCE) vulnerability via the Object parameter in the openwrt_getConfig function.