CVE-2020-12124
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- April 23, 2020
- Published Date
- October 02, 2020
- Last Updated
- August 04, 2024
- Vendor
- WAVLINK
- Product
- WN530H4
- Description
- A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
- Tags
- Score
- 91.67% (Percentile: 99.65%) as of 2025-06-14
- Exploited in the Wild
- Yes (2025-05-18 00:00:00 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS Score
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-18 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-12124.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
Scorpion-Security-Labs/CVE-2020-12124
Type: github • Created: 2023-12-18 18:09:55 UTC • Stars: 0
db44k/CVE-2020-12124
Type: github • Created: 2023-10-09 14:07:00 UTC • Stars: 0
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel