Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)) — Vulnerability Class 2669

2669 vulnerabilities classified as CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2025-8821 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasic os command injection — RE6250 6.3 Medium2025-08-11
CVE-2025-8818 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan setDFSSetting os command injection — RE6250 6.3 Medium2025-08-10
CVE-2012-10041 WAN Emulator v2.3 Command Execution — WAN Emulator 9.8 -2025-08-08
CVE-2012-10046 E-Mail Security Virtual Appliance learn-msg.cgi Command Injection — E-Mail Security Virtual Appliance 9.8 -2025-08-08
CVE-2010-10013 AjaXplorer < 2.6 checkInstall.php Unauthenticated RCE — AjaXplorer 9.8 -2025-08-08
CVE-2025-8748 OS command injection in MiR robots and MiR fleet via crafted HTTP requests — MiR Robots 8.8 High2025-08-08
CVE-2025-54958 Mubit Powered BLUE 870 操作系统命令注入漏洞 — Powered BLUE 870 9.8 -2025-08-08
CVE-2025-8697 agentUniverse MCPSessionManager/MCPTool/MCPToolkit StdioServerParameters os command injection — agentUniverse 6.3 Medium2025-08-07
CVE-2025-34148 Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via WISP SSID — M300 Wi-Fi Repeater 8.8AIHighAI2025-08-07
CVE-2025-34149 Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via WPA2 Key — M300 Wi-Fi Repeater 9.8AICriticalAI2025-08-07
CVE-2025-34150 Shenzhen Aitemi M300 Wi-Fi Repeater PPPoE Username Command Injection — M300 Wi-Fi Repeater 9.8AICriticalAI2025-08-07
CVE-2025-34151 Shenzhen Aitemi M300 Wi-Fi Repeater PPPoE Password Command Injection — M300 Wi-Fi Repeater 9.8AICriticalAI2025-08-07
CVE-2025-34152 Shenzhen Aitemi M300 Wi-Fi Repeater OS Command Injection via Time Parameter — M300 Wi-Fi Repeater 9.8AICriticalAI2025-08-07
CVE-2025-8667 SkyworkAI DeepResearchAgent tools.py from_mcp os command injection — DeepResearchAgent 6.3 Medium2025-08-06
CVE-2025-8665 agno-agi agno Model Context Protocol mcp.py MultiMCPTools os command injection — agno 6.3 Medium2025-08-06
CVE-2025-22469 SATO CL4/6NX Plus和SATO CL4/6NX-J Plus 操作系统命令注入漏洞 — CL4/6NX Plus 8.8AIHighAI2025-08-06
CVE-2025-8655 Kenwood DMX958XR libSystemLib Command injection Remote Code Execution Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8654 Kenwood DMX958XR ReadMVGImage Command Injection Remote Code Execution Vulnerability — DMX958XR 8.8AIHighAI2025-08-06
CVE-2025-8652 Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8651 Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8650 Kenwood DMX958XR libSystemLib Command Injection Remote Code Execution Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8649 Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8648 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8647 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8646 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8645 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8644 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8643 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8642 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06
CVE-2025-8641 Kenwood DMX958XR Firmware Update Command Injection Vulnerability — DMX958XR 6.8AIMediumAI2025-08-06

Vulnerabilities classified as CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)) represent 2669 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.