CVE-2010-20059
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
20/08/2025
Last modified:
22/08/2025
Description
FreeNAS 0.7.2 prior to revision 5543 includes an unauthenticated command‐execution backdoor in its web interface. The exec_raw.php script exposes a cmd parameter that is passed directly to the underlying shell without sanitation.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://github.com/freenas
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/freenas_exec_raw.rb
- https://sourceforge.net/projects/freenas/
- https://web.archive.org/web/20101218143110/http://sourceforge.net/projects/freenas/files//stable/0.7.2/NOTES%200.7.2.5543.txt/view
- https://www.exploit-db.com/exploits/16313
- https://www.tenable.com/plugins/nnm/5714
- https://www.truenas.com/freenas/
- https://www.vulncheck.com/advisories/freenas-arbitrary-command-execution
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/freenas_exec_raw.rb
- https://www.exploit-db.com/exploits/16313



