Vulnerability Description
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Howfor | Qihang Media Web Digital Signage | 3.0.9 |
Related Weaknesses (CWE)
References
- http://www.howfor.comProduct
- https://www.exploit-db.com/exploits/48751ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/qihang-media-web-digital-signage-unauthentiThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.phpExploitThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.phpExploitThird Party Advisory
FAQ
What is CVE-2020-36897?
CVE-2020-36897 is a vulnerability with a CVSS score of 9.8 (CRITICAL). QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit...
How severe is CVE-2020-36897?
CVE-2020-36897 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-36897?
Check the references section above for vendor advisories and patch information. Affected products include: Howfor Qihang Media Web Digital Signage.