Vulnerability Description
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/cha0yang1/SECCN/blob/main/UnauthorizedRCE.md
- https://github.com/cha0yang1/SECCN/blob/main/UnauthorizedRCE.md#2-vulnerability-
- https://vuldb.com/?ctiid.346488
- https://vuldb.com/?id.346488
- https://vuldb.com/?submit.754200
FAQ
What is CVE-2026-2686?
CVE-2026-2686 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os c...
How severe is CVE-2026-2686?
CVE-2026-2686 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-2686?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.