CVE-2019-17270
CRITICAL EXPLOITED IN THE WILD NUCLEIYachtcontrol < 2019-10-06 - OS Command Injection
Title source: ruleDescription
Yachtcontrol through 2019-10-06: It's possible to perform direct Operating System commands as an unauthenticated user via the "/pages/systemcall.php?command={COMMAND}" page and parameter, where {COMMAND} will be executed and returning the results to the client. Affects Yachtcontrol webservers disclosed via Dutch GPRS/4G mobile IP-ranges. IP addresses vary due to DHCP client leasing of telco's.
Exploits (1)
Nuclei Templates (1)
Yachtcontrol Webapplication 1.0 - Remote Command Injection
CRITICALby pikpikcu
Scores
CVSS v3
9.8
EPSS
0.9394
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2019-12-13
InTheWild.io
2019-12-13
CWE
CWE-78
Status
published
Products (1)
yachtcontrol/yachtcontrol
< 2019-10-06
Published
Dec 10, 2019
Tracked Since
Feb 18, 2026