CVE-2020-7980

Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI....

Basic Information

CVE State
PUBLISHED
Reserved Date
January 25, 2020
Published Date
January 25, 2020
Last Updated
August 04, 2024
Vendor
n/a
Product
n/a
Description
Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.
Tags
nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS Score

Score
93.35% (Percentile: 99.80%) as of 2025-05-27

Exploit Status

Exploited in the Wild
Yes (2025-04-29 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-04-29 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Xh4H/Satellian-CVE-2020-7980

Type: github • Created: 2020-01-28 23:27:20 UTC • Stars: 73

PoC script that shows RCE vulnerability over Intellian Satellite controller

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel