Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
Metrics
Affected Vendors & Products
References
History
Wed, 31 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands. | |
| Title | Selea CarPlateServer 4.0.1.6 Remote Program Execution via Configuration Endpoint | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-31T18:39:08.542Z
Reserved: 2025-12-23T13:21:10.769Z
Link: CVE-2020-36904
No data.
Status : Awaiting Analysis
Published: 2025-12-31T19:15:41.557
Modified: 2025-12-31T20:42:15.637
Link: CVE-2020-36904
No data.
OpenCVE Enrichment
No data.