Known Exploited Vulnerabilities Command Injection Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability allows remote attackers with read permissions to a public or private Bitbucket repositories to execute arbitrary code by sending a malicious HTTP request.
References
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-27104 is an operating system command injection vulnerability in Accellion File Transfer Appliance in that allows an adversary to execute commands by sending a specially crafted POST request to the product's administrative endpoint.
References
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability secondary_impact T1005 Data from Local System
Comments
CVE-2021-27104 is an operating system command injection vulnerability in Accellion File Transfer Appliance in that allows an adversary to execute commands by sending a specially crafted POST request to the product's administrative endpoint.
References
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability secondary_impact T1005 Data from Local System
Comments
CVE-2021-27102 is an operating system command execution vulnerability in Accellion File Transfer Appliance that allows an adversary to execute arbitrary commands via a local web service call.
References
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-27102 is an operating system command execution vulnerability in Accellion File Transfer Appliance that allows an adversary to execute arbitrary commands via a local web service call.
References
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2021-27102 is an operating system command execution vulnerability in Accellion File Transfer Appliance that allows an adversary to execute arbitrary commands via a local web service call.
References
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2021-27104 is an operating system command injection vulnerability in Accellion File Transfer Appliance in that allows an adversary to execute commands by sending a specially crafted POST request to the product's administrative endpoint.
References
CVE-2021-1498 Cisco HyperFlex HX Data Platform Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE-2021-1498 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2021-1498 Cisco HyperFlex HX Data Platform Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-1498 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2021-1497 Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE-2021-1497 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Installer Virtual Machine. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2021-1497 Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-1497 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Installer Virtual Machine. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability secondary_impact T1584.005 Botnet
Comments
CVE-2020-25506 is a command injection vulnerability in the D-Link DNS-320 FW v2.06B01 Revision Ax system_mgr.cgi component, which can lead to remote arbitrary code execution.
References
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2020-25506 is a command injection vulnerability in the D-Link DNS-320 FW v2.06B01 Revision Ax system_mgr.cgi component, which can lead to remote arbitrary code execution.
References
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE-2020-25506 is a command injection vulnerability in the D-Link DNS-320 FW v2.06B01 Revision Ax system_mgr.cgi component, which can lead to remote arbitrary code execution.
References
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability allows remote attackers with read permissions to a public or private Bitbucket repositories to execute arbitrary code by sending a malicious HTTP request.
References
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by an attacker who has access to administrator credentials. The adversary leverages these credentials to execute arbitrary commands using root privileges.
References
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited by an attacker who has access to administrator credentials. The adversary leverages these credentials to execute arbitrary commands using root privileges.
References
CVE-2021-22899 Ivanti Pulse Connect Secure Command Injection Vulnerability primary_impact T1059.003 Windows Command Shell
Comments
This vulnerability is exploited through a command injection weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution on the target system via the Windows Resource Profiles Feature.
References
CVE-2021-22899 Ivanti Pulse Connect Secure Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited through a command injection weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution on the target system via the Windows Resource Profiles Feature.
References
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through a command injection weakness in the web components of Ivanti Connect Secure and Ivanti Policy Secure. Attackers leverage this vulnerability to achieve remote code execution by sending specially crafted requests to vulnerable instances, potentially without requiring authentication when combined with other vulnerabilities. This manipulation allows attackers to execute arbitrary commands on the appliance, potentially enabling further exploitation and system compromise.
References
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited through a command injection weakness in the web components of Ivanti Connect Secure and Ivanti Policy Secure. Attackers leverage this vulnerability to achieve remote code execution by sending specially crafted requests to vulnerable instances, potentially without requiring authentication when combined with other vulnerabilities. This manipulation allows attackers to execute arbitrary commands on the appliance, potentially enabling further exploitation and system compromise.
References
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through improper privilege escalation in the Web User Interface feature of Cisco IOS XE software. Attackers first used this vulnerability to elevate privileges from a normal user to root by leveraging a newly created local user account. This allowed them to write malicious implants that enable them to execute arbitrary commands to the file system This CVE was exploited after the adversary exploited CVE-2023-20198.
References
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability primary_impact T1068 Exploitation for Privilege Escalation
Comments
This vulnerability is exploited through improper privilege escalation in the Web User Interface feature of Cisco IOS XE software. Attackers first used this vulnerability to elevate privileges from a normal user to root by leveraging a newly created local user account. This allowed them to write malicious implants that enable them to execute arbitrary commands to the file system This CVE was exploited after the adversary exploited CVE-2023-20198.
References
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited through improper privilege escalation in the Web User Interface feature of Cisco IOS XE software. Attackers first used this vulnerability to elevate privileges from a normal user to root by leveraging a newly created local user account. This allowed them to write an implant to the file system, further compromising the device. This CVE was exploited after the adversary exploited CVE-2023-20198.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands.
References
CVE-2022-29303 SolarView Compact Command Injection Vulnerability secondary_impact T1496 Resource Hijacking
Comments
CVE-2022-29303 is a command injection vulnerability within a PHP component in the product's web server. Reports indicate that the vulnerability have been exploited by operators of Mirai botnet malware.
References
CVE-2022-29303 SolarView Compact Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2022-29303 is a command injection vulnerability within a PHP component in the product's web server. Reports indicate that the vulnerability have been exploited by operators of Mirai botnet malware.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability secondary_impact T1041 Exfiltration Over C2 Channel
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability secondary_impact T1070 Indicator Removal
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability secondary_impact T1498 Network Denial of Service
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability exploitation_technique T1106 Native API
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2022-29303 SolarView Compact Command Injection Vulnerability exploitation_technique T1505 Server Software Component
Comments
CVE-2022-29303 is a command injection vulnerability within a PHP component in the product's web server. Reports indicate that the vulnerability have been exploited by operators of Mirai botnet malware.
References
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability secondary_impact T1498 Network Denial of Service
Comments
CVE-2023-49897 is an OS command injection vulnerability affecting AE1021PE firmware. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE-2023-49897 is an OS command injection vulnerability affecting AE1021PE firmware. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
CVE-2023-49897 is an OS command injection vulnerability affecting AE1021PE firmware. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability secondary_impact T1498 Network Denial of Service
Comments
CVE-2023-47565 is an OS command injection vulnerability in QNAP VioStor network video recorder (NVR) devices. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE-2023-47565 is an OS command injection vulnerability in QNAP VioStor network video recorder (NVR) devices. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
CVE-2023-47565 is an OS command injection vulnerability in QNAP VioStor network video recorder (NVR) devices. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-20887 Vmware Aria Operations for Networks Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by a remote, unauthenticated actor to gain remote code execution via a command injection attack. This vulnerability has been exploited in the wild; however, technical details have not been publicly shared.
References
CVE-2023-20887 Vmware Aria Operations for Networks Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by a remote, unauthenticated actor to gain remote code execution via a command injection attack. This vulnerability has been exploited in the wild; however, technical details have not been publicly shared.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2022-29303 SolarView Compact Command Injection Vulnerability 3
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability 2
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability 3
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability 3
CVE-2023-20887 Vmware Aria Operations for Networks Command Injection Vulnerability 2
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability 3
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability 3
CVE-2021-1498 Cisco HyperFlex HX Data Platform Command Injection Vulnerability 2
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability 2
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability 3
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability 3
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability 2
CVE-2021-22899 Ivanti Pulse Connect Secure Command Injection Vulnerability 2
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability 5
CVE-2021-1497 Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability 2
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability 2