A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. | |
| Title | SECCN Dingcheng G10 session_login.cgi qq os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-19T00:02:07.214Z
Reserved: 2026-02-18T14:09:31.781Z
Link: CVE-2026-2686
No data.
Status : Received
Published: 2026-02-19T00:16:22.143
Modified: 2026-02-19T00:16:22.143
Link: CVE-2026-2686
No data.
OpenCVE Enrichment
No data.