CVE-2020-15568

TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation...

Basic Information

CVE State
PUBLISHED
Reserved Date
July 06, 2020
Published Date
January 30, 2021
Last Updated
August 04, 2024
Vendor
n/a
Product
n/a
Description
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
Tags
php nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS Score

Score
93.12% (Percentile: 99.78%) as of 2025-05-27

Exploit Status

Exploited in the Wild
Yes (2025-04-30 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-04-29 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

divinepwner/TerraMaster-TOS-CVE-2020-15568

Type: github • Created: 2023-02-21 13:10:45 UTC • Stars: 3

Repository for CVE-2020-15568 Metasploit module

n0bugz/CVE-2020-15568

Type: github • Created: 2022-10-22 17:20:01 UTC • Stars: 2

A quick and easy POC for CVE-2020-15568

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel