CVE-2012-0262

EXPLOITED

op5config/welcome <2.0.3 - Command Injection

Title source: llm

Description

op5config/welcome in system-op5config before 2.0.3 in op5 Monitor and op5 Appliance before 5.5.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsmultiple
https://www.exploit-db.com/exploits/41687
metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/op5_welcome.rb

Scores

EPSS 0.9000
EPSS Percentile 99.6%

Details

VulnCheck KEV 2020-12-01
CWE
CWE-94
Status published
Products (6)
op5/monitor 5.3.5
op5/monitor 5.4.0
op5/monitor 5.4.2
op5/monitor 5.5.0
op5/monitor < 5.5.1
op5/system-op5config < 2.0.2
Published Dec 31, 2013
Tracked Since Feb 18, 2026