CVE-2020-17456
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- August 09, 2020
- Published Date
- August 19, 2020
- Last Updated
- August 04, 2024
- Vendor
- SEOWONINTECH CO., LTD
- Product
- SLC-130 & SLR-120S
- Description
- SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
- Tags
- Score
- 91.56% (Percentile: 99.64%) as of 2025-05-24
- Exploited in the Wild
- Yes (added 2025-05-23 00:00:00 UTC) Source
nuclei_scanner
CVSS Scores
CVSS v3.1
9.8 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS Score
Exploit Status
References
https://maj0rmil4d.github.io/Seowon-SlC-130-And-SLR-120S-Exploit/
http://packetstormsecurity.com/files/158933/Seowon-SlC-130-Router-Remote-Code-Execution.html
http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html
https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated
https://www.exploit-db.com/exploits/50821
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-24 12:00:23 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-17456.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated
Type: github • Created: 2022-03-11 00:16:35 UTC • Stars: 7
Seowon SLR-120S42G RCE Exploit / Remote Code Execution (Unauthenticated)
Al1ex/CVE-2020-17456
Type: github • Created: 2021-01-21 06:16:40 UTC • Stars: 4
CVE-2020-17456 & Seowon SLC 130 Router RCE