CVE-2020-6627
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
06/12/2022
Last modified:
23/04/2025
Description
The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:seagate:stcg2000300_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:seagate:stcg2000300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:seagate:stcg3000300_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:seagate:stcg3000300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:seagate:stcg4000300_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:seagate:stcg4000300:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html
- https://github.com/rapid7/metasploit-framework/pull/12844
- https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/
- https://www.invictuseurope.com/blog/
- http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html
- https://github.com/rapid7/metasploit-framework/pull/12844
- https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/
- https://www.invictuseurope.com/blog/



