CVE-2020-28653
CRITICAL EXPLOITED NUCLEIZohocorp Manageengine Opmanager < 12.5 - Remote Code Execution
Title source: ruleDescription
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
Exploits (4)
metasploit
WORKING POC
EXCELLENT
by Johannes Moritz, Robin Peraglie, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/opmanager_sumpdu_deserialization.rb
Nuclei Templates (1)
ManageEngine OpManager SumPDU 12.1 - 12.5.232 - Java Deserialization
CRITICALby iamnoooob,pdresearch
Shodan:
http.title:"opmanager plus" || http.title:"opmanager"
FOFA:
title="opmanager plus" || title="opmanager"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9300
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-10-28
Status
published
Products (1)
zohocorp/manageengine_opmanager
12.5 build125000 (50 CPE variants)
Published
Feb 03, 2021
Tracked Since
Feb 18, 2026