Known Exploited Vulnerabilities Command Injection Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1112 Modify Registry
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1053 Scheduled Task/Job
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1543 Create or Modify System Process
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1033 System Owner/User Discovery
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1068 Exploitation for Privilege Escalation
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1071.001 Web Protocols
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1570 Lateral Tool Transfer
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1003 OS Credential Dumping
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1003.001 LSASS Memory
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability secondary_impact T1041 Exfiltration Over C2 Channel
Comments
CVE-2024-4577 is a PHP argument injection vulnerability that allows an adversary to execute arbitrary php commands. Threat actors have been observed utilizing Cobalt Strike and the TaoWu toolkit for post-exploitation activities, such as conducting reconnaisance, establishing persistence, escalating privileges to SYSTEM level, and harvesting credentials.
References
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited through a command injection weakness in the web components of Ivanti Connect Secure and Ivanti Policy Secure. Attackers leverage this vulnerability to achieve remote code execution by sending specially crafted requests to vulnerable instances, potentially without requiring authentication when combined with other vulnerabilities. This manipulation allows attackers to execute arbitrary commands on the appliance, potentially enabling further exploitation and system compromise. Threat actors have been reported as likely targeting credentials and the deployment of web shells to provide future access.
References
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through a command injection weakness in the web components of Ivanti Connect Secure and Ivanti Policy Secure. Attackers leverage this vulnerability to achieve remote code execution by sending specially crafted requests to vulnerable instances, potentially without requiring authentication when combined with other vulnerabilities. This manipulation allows attackers to execute arbitrary commands on the appliance, potentially enabling further exploitation and system compromise. Threat actors have been reported as likely targeting credentials and the deployment of web shells to provide future access.
References
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability secondary_impact T1505.003 Web Shell
Comments
This vulnerability is exploited through a command injection weakness in the web components of Ivanti Connect Secure and Ivanti Policy Secure. Attackers leverage this vulnerability to achieve remote code execution by sending specially crafted requests to vulnerable instances, potentially without requiring authentication when combined with other vulnerabilities. This manipulation allows attackers to execute arbitrary commands on the appliance, potentially enabling further exploitation and system compromise. Threat actors have been reported as likely targeting credentials and the deployment of web shells to provide future access.
References
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability secondary_impact T1552 Unsecured Credentials
Comments
This vulnerability is exploited through a command injection weakness in the web components of Ivanti Connect Secure and Ivanti Policy Secure. Attackers leverage this vulnerability to achieve remote code execution by sending specially crafted requests to vulnerable instances, potentially without requiring authentication when combined with other vulnerabilities. This manipulation allows attackers to execute arbitrary commands on the appliance, potentially enabling further exploitation and system compromise. Threat actors have been reported as likely targeting credentials and the deployment of web shells to provide future access.
References
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by an attacker who has access to administrator credentials. The adversary leverages these credentials to execute arbitrary commands using root privileges.
References
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited by an attacker who has access to administrator credentials. The adversary leverages these credentials to execute arbitrary commands using root privileges.
References
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE-2023-49897 is an OS command injection vulnerability affecting AE1021PE firmware. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
CVE-2023-49897 is an OS command injection vulnerability affecting AE1021PE firmware. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability secondary_impact T1498 Network Denial of Service
Comments
CVE-2023-49897 is an OS command injection vulnerability affecting AE1021PE firmware. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE-2023-47565 is an OS command injection vulnerability in QNAP VioStor network video recorder (NVR) devices. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
CVE-2023-47565 is an OS command injection vulnerability in QNAP VioStor network video recorder (NVR) devices. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability secondary_impact T1498 Network Denial of Service
Comments
CVE-2023-47565 is an OS command injection vulnerability in QNAP VioStor network video recorder (NVR) devices. This vulnerability has been publicly reported to be leveraged during the InfectedSlurs campaign to install a Mirai malware variant with the intention of creating a distributed denial-of-service (DDoS) botnet with these infected devices.
References
CVE-2023-20887 Vmware Aria Operations for Networks Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited by a remote, unauthenticated actor to gain remote code execution via a command injection attack. This vulnerability has been exploited in the wild; however, technical details have not been publicly shared.
References
CVE-2023-20887 Vmware Aria Operations for Networks Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited by a remote, unauthenticated actor to gain remote code execution via a command injection attack. This vulnerability has been exploited in the wild; however, technical details have not been publicly shared.
References
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through improper privilege escalation in the Web User Interface feature of Cisco IOS XE software. Attackers first used this vulnerability to elevate privileges from a normal user to root by leveraging a newly created local user account. This allowed them to write malicious implants that enable them to execute arbitrary commands to the file system This CVE was exploited after the adversary exploited CVE-2023-20198.
References
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited through improper privilege escalation in the Web User Interface feature of Cisco IOS XE software. Attackers first used this vulnerability to elevate privileges from a normal user to root by leveraging a newly created local user account. This allowed them to write an implant to the file system, further compromising the device. This CVE was exploited after the adversary exploited CVE-2023-20198.
References
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability primary_impact T1068 Exploitation for Privilege Escalation
Comments
This vulnerability is exploited through improper privilege escalation in the Web User Interface feature of Cisco IOS XE software. Attackers first used this vulnerability to elevate privileges from a normal user to root by leveraging a newly created local user account. This allowed them to write malicious implants that enable them to execute arbitrary commands to the file system This CVE was exploited after the adversary exploited CVE-2023-20198.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability primary_impact T1496 Resource Hijacking
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability secondary_impact T1041 Exfiltration Over C2 Channel
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability secondary_impact T1070 Indicator Removal
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability secondary_impact T1498 Network Denial of Service
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability exploitation_technique T1106 Native API
Comments
CVE-2023-1389 is a command injection vulnerability in one of the API components within the TP-Link Archer router’s web management interface. Public reports have reported that multiple botnet malware under the Mirai variants, including Condi, are targeting these vulnerable devices.
References
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability allows remote attackers with read permissions to a public or private Bitbucket repositories to execute arbitrary code by sending a malicious HTTP request.
References
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability allows remote attackers with read permissions to a public or private Bitbucket repositories to execute arbitrary code by sending a malicious HTTP request.
References
CVE-2022-29303 SolarView Compact Command Injection Vulnerability secondary_impact T1496 Resource Hijacking
Comments
CVE-2022-29303 is a command injection vulnerability within a PHP component in the product's web server. Reports indicate that the vulnerability have been exploited by operators of Mirai botnet malware.
References
CVE-2022-29303 SolarView Compact Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2022-29303 is a command injection vulnerability within a PHP component in the product's web server. Reports indicate that the vulnerability have been exploited by operators of Mirai botnet malware.
References
CVE-2022-29303 SolarView Compact Command Injection Vulnerability exploitation_technique T1505 Server Software Component
Comments
CVE-2022-29303 is a command injection vulnerability within a PHP component in the product's web server. Reports indicate that the vulnerability have been exploited by operators of Mirai botnet malware.
References
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2021-27104 is an operating system command injection vulnerability in Accellion File Transfer Appliance in that allows an adversary to execute commands by sending a specially crafted POST request to the product's administrative endpoint.
References
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-27104 is an operating system command injection vulnerability in Accellion File Transfer Appliance in that allows an adversary to execute commands by sending a specially crafted POST request to the product's administrative endpoint.
References
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability secondary_impact T1005 Data from Local System
Comments
CVE-2021-27104 is an operating system command injection vulnerability in Accellion File Transfer Appliance in that allows an adversary to execute commands by sending a specially crafted POST request to the product's administrative endpoint.
References
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
CVE-2021-27102 is an operating system command execution vulnerability in Accellion File Transfer Appliance that allows an adversary to execute arbitrary commands via a local web service call.
References
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-27102 is an operating system command execution vulnerability in Accellion File Transfer Appliance that allows an adversary to execute arbitrary commands via a local web service call.
References
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability secondary_impact T1005 Data from Local System
Comments
CVE-2021-27102 is an operating system command execution vulnerability in Accellion File Transfer Appliance that allows an adversary to execute arbitrary commands via a local web service call.
References
CVE-2021-22899 Ivanti Pulse Connect Secure Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
This vulnerability is exploited through a command injection weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution on the target system via the Windows Resource Profiles Feature.
References
CVE-2021-22899 Ivanti Pulse Connect Secure Command Injection Vulnerability primary_impact T1059.003 Windows Command Shell
Comments
This vulnerability is exploited through a command injection weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution on the target system via the Windows Resource Profiles Feature.
References
CVE-2021-1498 Cisco HyperFlex HX Data Platform Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-1498 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2021-1498 Cisco HyperFlex HX Data Platform Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE-2021-1498 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2021-1497 Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-1497 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Installer Virtual Machine. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2021-1497 Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE-2021-1497 is a critical vulnerability in the web-based management interface of Cisco HyperFlex HX Installer Virtual Machine. This vulnerability allows an unauthenticated, remote attacker to perform a command injection attack against an affected device
References
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2020-25506 is a command injection vulnerability in the D-Link DNS-320 FW v2.06B01 Revision Ax system_mgr.cgi component, which can lead to remote arbitrary code execution.
References
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability secondary_impact T1584.005 Botnet
Comments
CVE-2020-25506 is a command injection vulnerability in the D-Link DNS-320 FW v2.06B01 Revision Ax system_mgr.cgi component, which can lead to remote arbitrary code execution.
References
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
CVE-2020-25506 is a command injection vulnerability in the D-Link DNS-320 FW v2.06B01 Revision Ax system_mgr.cgi component, which can lead to remote arbitrary code execution.
References
CVE-2025-20337 Cisco Identity Services Engine Injection Vulnerability exploitation_technique T1106 Native API
Comments
This vulnerability, present in the API in Cisco ISE and Cisco ISE-PIC, allows for an attacker to use maliciously crafted API requests to a vulnerable device. If exploited, the attacker can gain the ability to execute arbitrary code at the root level.
References
CVE-2025-20337 Cisco Identity Services Engine Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability, present in the API in Cisco ISE and Cisco ISE-PIC, allows for an attacker to use maliciously crafted API requests to a vulnerable device. If exploited, the attacker can gain the ability to execute arbitrary code at the root level.
References
CVE-2025-20281 Cisco Identity Services Engine Injection Vulnerability exploitation_technique T1106 Native API
Comments
This vulnerability, present in the API in Cisco ISE and Cisco ISE-PIC, allows for an attacker to use maliciously crafted API requests to a vulnerable device. If exploited, the attacker can gain the ability to execute arbitrary code at the root level.
References
CVE-2025-20281 Cisco Identity Services Engine Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability, present in the API in Cisco ISE and Cisco ISE-PIC, allows for an attacker to use maliciously crafted API requests to a vulnerable device. If exploited, the attacker can gain the ability to execute arbitrary code at the root level.
References
CVE-2024-6047 GeoVision Devices OS Command Injection Vulnerability exploitation_technique T1055 Process Injection
Comments
End-of-life GeoVision IoT devices contain improper input filtering, allowing for commands to be injected into the szSrvIpAddr parameter of the /DateSetting.cgi endpoint. Exploiting this vulnerability can allow remote code execution on the system.
References
CVE-2024-6047 GeoVision Devices OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
End-of-life GeoVision IoT devices contain improper input filtering, allowing for commands to be injected into the szSrvIpAddr parameter of the /DateSetting.cgi endpoint. Exploiting this vulnerability can allow remote code execution on the system.
References
CVE-2024-50603 Aviatrix Controllers OS Command Injection Vulnerability exploitation_technique T1055 Process Injection
Comments
Due to improper handling of user input, an attacker can insert shell metacharacters into specific parameters, permitting the execution of arbitrary commands.
References
CVE-2024-50603 Aviatrix Controllers OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
Due to improper handling of user input, an attacker can insert shell metacharacters into specific parameters, permitting the execution of arbitrary commands.
References
CVE-2024-41710 Mitel SIP Phones Argument Injection Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
Improper input sanitization in the Mitel 6869i SIP Phone, firmware version 6.3.0.1020 can be exploited to obtain root access on the device and execute arbitrary code.
References
CVE-2024-41710 Mitel SIP Phones Argument Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
Improper input sanitization in the Mitel 6869i SIP Phone, firmware version 6.3.0.1020 can be exploited to obtain root access on the device and execute arbitrary code.
References
CVE-2024-12987 DrayTek Vigor Routers OS Command Injection Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
An unauthenticated, remote attacker can exploit this vulnerability to escalate privileges and execute arbitrary code with root access.
References
CVE-2024-12987 DrayTek Vigor Routers OS Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
An unauthenticated, remote attacker can exploit this vulnerability to escalate privileges and execute arbitrary code with root access.
References
CVE-2024-11120 GeoVision Devices OS Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
Specific end-of-life GeoVision IoT devices contain an insufficient input validation vulnerability that allows for unauthenticated attackers to inject arbitrary commands and execute them on the system.
References
CVE-2024-11120 GeoVision Devices OS Command Injection Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
Specific end-of-life GeoVision IoT devices contain an insufficient input validation vulnerability that allows for unauthenticated attackers to inject arbitrary commands and execute them on the system.
References
CVE-2024-11120 GeoVision Devices OS Command Injection Vulnerability primary_impact T1498 Network Denial of Service
Comments
Specific end-of-life GeoVision IoT devices contain an insufficient input validation vulnerability that allows for unauthenticated attackers to inject arbitrary commands and execute them on the system. This leads to denial of service.
References
CVE-2023-44221 SonicWall SMA100 Appliances OS Command Injection Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
This post-authentication command injection vulnerability is chained with CVE-2024-38475 to allow command execution as the nobody user, affecting versions below 10.2.1.10-62sv.
References
CVE-2023-44221 SonicWall SMA100 Appliances OS Command Injection Vulnerability exploitation_technique T1548 Abuse Elevation Control Mechanism
Comments
This post-authentication command injection vulnerability is chained with CVE-2024-38475 to allow command execution as the nobody user, affecting versions below 10.2.1.10-62sv.
References
CVE-2023-44221 SonicWall SMA100 Appliances OS Command Injection Vulnerability primary_impact T1059.004 Unix Shell
Comments
This post-authentication command injection vulnerability is chained with CVE-2024-38475 to allow command execution as the nobody user, affecting versions below 10.2.1.10-62sv.
References
CVE-2023-44221 SonicWall SMA100 Appliances OS Command Injection Vulnerability secondary_impact T1543 Create or Modify System Process
Comments
This post-authentication command injection vulnerability is chained with CVE-2024-38475 to allow command execution as the nobody user, affecting versions below 10.2.1.10-62sv.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability exploitation_technique T1133 External Remote Services
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability exploitation_technique T1588 Obtain Capabilities
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability primary_impact T1059.004 Unix Shell
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability secondary_impact T1021.004 SSH
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
CVE-2023-33538 TP-Link Multiple Routers Command Injection Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
End-of-life TP-Link routers contain an improper input sanitization flaw that attackers can exploit by sending specially crafted HTTP GET requests to the web interface, leading to privilege escalation and arbitrary code execution.
References
CVE-2023-33538 TP-Link Multiple Routers Command Injection Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
End-of-life TP-Link routers contain an improper input sanitization flaw that attackers can exploit by sending specially crafted HTTP GET requests to the web interface, leading to privilege escalation and arbitrary code execution.
References
CVE-2021-20035 SonicWall SMA100 Appliances OS Command Injection Vulnerability exploitation_technique T1078 Valid Accounts
Comments
While this vulnerability was originally considered a denial-of-service issue in 2021, this improper neutralization issue has been exploited in 2025 as a remote code execution vulnerability. After authenticating (either with default credentials or via brute force, password stuffing, or dictionary attacks), an attacker can execute arbitrary commands as a "nobody" user.
References
CVE-2021-20035 SonicWall SMA100 Appliances OS Command Injection Vulnerability exploitation_technique T1059 Command and Scripting Interpreter
Comments
While this vulnerability was originally considered a denial-of-service issue in 2021, this improper neutralization issue has been exploited in 2025 as a remote code execution vulnerability. After authenticating (either with default credentials or via brute force, password stuffing, or dictionary attacks), an attacker can execute arbitrary commands as a "nobody" user.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability 2
CVE-2025-20281 Cisco Identity Services Engine Injection Vulnerability 2
CVE-2021-20035 SonicWall SMA100 Appliances OS Command Injection Vulnerability 2
CVE-2021-27102 Accellion FTA OS Command Injection Vulnerability 3
CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability 5
CVE-2024-11120 GeoVision Devices OS Command Injection Vulnerability 3
CVE-2023-33538 TP-Link Multiple Routers Command Injection Vulnerability 2
CVE-2024-4577 PHP-CGI OS Command Injection Vulnerability 12
CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability 3
CVE-2024-12987 DrayTek Vigor Routers OS Command Injection Vulnerability 2
CVE-2021-27104 Accellion FTA OS Command Injection Vulnerability 3
CVE-2023-44221 SonicWall SMA100 Appliances OS Command Injection Vulnerability 4
CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability 3
CVE-2024-20399 Cisco NX-OS Command Injection Vulnerability 2
CVE-2023-1389 TP-Link Archer AX-21 Command Injection Vulnerability 5
CVE-2020-25506 D-Link DNS-320 Device Command Injection Vulnerability 3
CVE-2025-20337 Cisco Identity Services Engine Injection Vulnerability 2
CVE-2023-20273 Cisco IOS XE Web UI Command Injection Vulnerability 3
CVE-2021-1497 Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability 2
CVE-2024-50603 Aviatrix Controllers OS Command Injection Vulnerability 2
CVE-2021-22899 Ivanti Pulse Connect Secure Command Injection Vulnerability 2
CVE-2023-20887 Vmware Aria Operations for Networks Command Injection Vulnerability 2
CVE-2024-41710 Mitel SIP Phones Argument Injection Vulnerability 2
CVE-2022-29303 SolarView Compact Command Injection Vulnerability 3
CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability 4
CVE-2021-1498 Cisco HyperFlex HX Data Platform Command Injection Vulnerability 2
CVE-2024-6047 GeoVision Devices OS Command Injection Vulnerability 2