CVE-2026-2686
CRITICALSECCN Dingcheng G10 3.1.0.181203 - Command Injection
Title source: llmDescription
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
References (5)
Core 5
Core References
Permissions Required, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.346488
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.346488
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.754200
Various Sources related
https://github.com/cha0yang1/SECCN/blob/main/UnauthorizedRCE.md
Scores
CVSS v3
9.8
EPSS
0.0006
EPSS Percentile
17.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-77
CWE-78
Status
published
Products (1)
SECCN Dingcheng/G10
3.1.0.181203
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026