Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://blog.quake.so/post/zeroshell_linux_router_rce/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:55:09.657Z
Reserved: 2020-11-30T00:00:00
Link: CVE-2020-29390

No data.

Status : Modified
Published: 2020-11-30T18:15:11.610
Modified: 2024-11-21T05:23:58.757
Link: CVE-2020-29390

No data.