CVE-2016-15047

HIGH EXPLOITED

AVTECH devices - Command Injection

Title source: llm

Description

AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The `exefile` parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisting. An authenticated attacker who can invoke this endpoint can supply crafted input to execute arbitrary system commands as root. Successful exploitation grants full control of the device, and - depending on deployment and whether the device stores credentials or has network reachability to internal systems - may enable credential theft, lateral movement, or data exfiltration. The archived SEARCH-LAB disclosure implies that this vulnerability was remediated in early 2017, but AVTECH has not defined an affected version range.

Exploits (1)

exploitdb WRITEUP
by Gergely Eberhardt · pythonwebappscgi
https://www.exploit-db.com/exploits/40500

Scores

CVSS v4 8.7
EPSS 0.0032
EPSS Percentile 55.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Details

VulnCheck KEV 2017-03-10
CWE
CWE-78
Status published
Products (1)
AVTECH SECURITY Corporation/IP Camera, NVR, and DVR Devices
Published Oct 09, 2025
Tracked Since Feb 18, 2026