CVE-2020-8949
high-risk
Published 2020-02-12
Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.
Do I need to act?
~
3.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (7)
S2A Wl Firmware
S2A Firmware
S2A Firmware
S2A Firmware
S3A K2P Mtk Firmware
S3A Firmware
Isp3000 Firmware
Affected Vendors
51
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
7/34 · Low
Exposure
14/34 · Moderate