10
CVSSv2

CVE-2020-7980

Published: 25/01/2020 Updated: 01/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Intellian Aptus Web 1.24 allows remote malicious users to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intelliantech aptus web 1.24

Exploits

Satellian version 112 suffers from a remote code execution vulnerability ...

Github Repositories

PoC script that shows RCE vulnerability over Intellian Satellite controller

Satellian-CVE-2020-7980 Satellian is a PoC script that shows RCE vulnerability over Intellian Satellite controller (Intellian Aptus Web) The following script will try to list all the binaries in the system and afterwards will allow the tester to interact directly with the server (usually as root) PoC xh4h@Macbook-xh4h ~/Satellian> python satellianpy -u <