CVE-2012-0262
EXPLOITEDop5config/welcome <2.0.3 - Command Injection
Title source: llmDescription
op5config/welcome in system-op5config before 2.0.3 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsmultiple
https://www.exploit-db.com/exploits/41687
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/op5_welcome.rb
References (6)
Scores
EPSS
0.9000
EPSS Percentile
99.6%
Details
VulnCheck KEV
2020-12-01
CWE
CWE-94
Status
published
Products (6)
op5/monitor
5.3.5
op5/monitor
5.4.0
op5/monitor
5.4.2
op5/monitor
5.5.0
op5/monitor
< 5.5.1
op5/system-op5config
< 2.0.2
Published
Dec 31, 2013
Tracked Since
Feb 18, 2026