CVE-2020-12124

A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to...

Basic Information

CVE State
PUBLISHED
Reserved Date
April 23, 2020
Published Date
October 02, 2020
Last Updated
August 04, 2024
Vendor
WAVLINK
Product
WN530H4
Description
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
Tags
linux nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS Score

Score
91.67% (Percentile: 99.65%) as of 2025-06-14

Exploit Status

Exploited in the Wild
Yes (2025-05-18 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-18 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Scorpion-Security-Labs/CVE-2020-12124

Type: github • Created: 2023-12-18 18:09:55 UTC • Stars: 0

An implementation of a proof-of-concept for CVE-2020-12124

db44k/CVE-2020-12124

Type: github • Created: 2023-10-09 14:07:00 UTC • Stars: 0

An implementation of a proof-of-concept for CVE-2020-12124 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12124)

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel