← Zuruck zu CVEs
CVE-2020-37052
CRITICAL9.8
Beschreibung
AirControl 1.4.2 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through malicious Java expression injection. Attackers can exploit the /.seam endpoint by crafting a specially constructed URL with embedded Java expressions to run commands with the application's system privileges.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/30/2026
Zuletzt geandert2/3/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-94
Referenzen
https://www.exploit-db.com/exploits/48541(disclosure@vulncheck.com)
https://www.ui.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/aircontrol-preauth-remote-code-execution(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.