CVE-2020-15568
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- July 06, 2020
- Published Date
- January 30, 2021
- Last Updated
- August 04, 2024
- Vendor
- n/a
- Product
- n/a
- Description
- TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
- Tags
- Score
- 93.12% (Percentile: 99.78%) as of 2025-05-27
- Exploited in the Wild
- Yes (2025-04-30 00:00:00 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS Score
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-04-29 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-15568.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
divinepwner/TerraMaster-TOS-CVE-2020-15568
Type: github • Created: 2023-02-21 13:10:45 UTC • Stars: 3
n0bugz/CVE-2020-15568
Type: github • Created: 2022-10-22 17:20:01 UTC • Stars: 2
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel