CVE-2020-37123
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.
Analysis
Remote code execution via OS command injection in Pinger 1.0 allows attackers to inject shell commands through the ping target parameter. EPSS 12.2% indicates significant exploitation likelihood. PoC available.
Technical Context
CWE-78 OS command injection. User-supplied ping target is passed directly to a system shell command without sanitization, enabling arbitrary command execution.
Affected Products
['Pinger 1.0']
Remediation
Use parameterized system calls instead of shell execution. Validate input against IP address/hostname patterns.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today