CVE-2020-8949

high-risk
Published 2020-02-12

Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.

Do I need to act?

~
3.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (7)

S2A Wl Firmware
S2A Firmware
S2A Firmware
S2A Firmware
S3A K2P Mtk Firmware
S3A Firmware
Isp3000 Firmware

Affected Vendors

51
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 7/34 · Low
Exposure 14/34 · Moderate