CVE-2020-8654

HIGH NUCLEI

EyesOfNetwork <5.3 - Command Injection

Title source: llm

Description

An issue was discovered in EyesOfNetwork 5.3. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the /module/module_frame/index.php autodiscovery.php target field.

Exploits (3)

exploitdb WORKING POC
rubyremotemultiple
https://www.exploit-db.com/exploits/48169
exploitdb WORKING POC
webappsphp
https://www.exploit-db.com/exploits/48025
metasploit WORKING POC EXCELLENT
by Clément Billac, bcoles, Erik Wynter · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb

Nuclei Templates (1)

EyesOfNetwork 5.1-5.3 - SQL Injection/Remote Code Execution
HIGHby praetorian-thendrickson

Scores

CVSS v3 8.8
EPSS 0.9335
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-78
Status published

Affected Products (1)

eyesofnetwork/eyesofnetwork

Timeline

Published Feb 07, 2020
Tracked Since Feb 18, 2026