Known Exploited Vulnerabilities Command Execution Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2023-33246 Apache RocketMQ Command Execution Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by a remote attacker who leverages a command injection flaw in Apache RocketMQ versions 5.1 and lower. By using the update configuration function, the adversary can execute commands as the system user under which RocketMQ is running. This lack of permission verification in components like NameServer, Broker, and Controller, which are exposed on the extranet, allows for remote command execution. Additionally, attackers can forge RocketMQ protocol content to achieve the same effect. Since at least June 2023, threat actors have actively exploited this vulnerability to gain initial access and deploy the DreamBus botnet, a Linux-based malware.
References
CVE-2023-33246 Apache RocketMQ Command Execution Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by a remote attacker who leverages a command injection flaw in Apache RocketMQ versions 5.1 and lower. By using the update configuration function, the adversary can execute commands as the system user under which RocketMQ is running. This lack of permission verification in components like NameServer, Broker, and Controller, which are exposed on the extranet, allows for remote command execution. Additionally, attackers can forge RocketMQ protocol content to achieve the same effect. Since at least June 2023, threat actors have actively exploited this vulnerability to gain initial access and deploy the DreamBus botnet, a Linux-based malware.
References
CVE-2023-33246 Apache RocketMQ Command Execution Vulnerability secondary_impact T1608.001 Upload Malware
Comments
This vulnerability is exploited by a remote attacker who leverages a command injection flaw in Apache RocketMQ versions 5.1 and lower. By using the update configuration function, the adversary can execute commands as the system user under which RocketMQ is running. This lack of permission verification in components like NameServer, Broker, and Controller, which are exposed on the extranet, allows for remote command execution. Additionally, attackers can forge RocketMQ protocol content to achieve the same effect. Since at least June 2023, threat actors have actively exploited this vulnerability to gain initial access and deploy the DreamBus botnet, a Linux-based malware.
References
CVE-2021-42237 Sitecore XP Remote Command Execution Vulnerability primary_impact T1059 Command and Scripting Interpreter
CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
Due to improper input sanitization, the web interface of the Edimax IC-7100 contains a vulnerability that allows for a user to send a crafted HTTP request containing a malicious command(s), which the camera's OS can be forced to execute.
References
CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability primary_impact T1055 Process Injection
CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability exploitation_technique T1055 Process Injection
Comments
Zyxel CPE devices contain a Telnet interface that fails to properly sanitize input containing special characters, which facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise.
References
CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability primary_impact T1011 Exfiltration Over Other Network Medium
Comments
Zyxel CPE devices contain a Telnet interface that fails to properly sanitize input containing special characters, which facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise.
References
CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability exploitation_technique T1055 Process Injection
Comments
Zyxel CPE contain an HTTP-based vulnerability that facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise. No public proof-of-concept exists for this exploit, and Zyxel has no intention of patching the vulnerability since the devices affected are end-of-life.
References
CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability primary_impact T1011 Exfiltration Over Other Network Medium
Comments
Zyxel CPE contain an HTTP-based vulnerability that facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise. No public proof-of-concept exists for this exploit, and Zyxel has no intention of patching the vulnerability since the devices affected are end-of-life.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability 2
CVE-2023-33246 Apache RocketMQ Command Execution Vulnerability 3
CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability 2
CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability 2
CVE-2021-42237 Sitecore XP Remote Command Execution Vulnerability 1