cve/2020/CVE-2020-3219.md

18 lines
1020 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-3219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3219)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20IOS%20XE%20Software%2016.1.1&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77&color=brighgreen)
### Description
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input to the web UI. A successful exploit could allow an attacker to execute arbitrary commands with administrative privileges on an affected device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/p1ay8y3ar/cve_monitor