CVE-2020-37002
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.
Analysis
Authentication bypass leading to command execution in Ajenti 2.1.36. Despite requiring login, the authentication can be bypassed for subsequent command execution. EPSS 0.64% with PoC available.
Technical Context
CWE-78 post-authentication command execution with an authentication bypass. Older version of the same product as CVE-2026-27975.
Affected Products
['Ajenti 2.1.36']
Remediation
Update to Ajenti 2.2.13.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today