CVE-2020-36910 (CNNVD-202601-1031)
HIGH
中文标题:
Cayin Signage Media Player 操作系统命令注入漏洞
英文标题:
Cayin Signage Media Player 3.0 Authenticated Remote Command Injection via NTP Parameter
CVSS分数:
8.7
发布时间:
2026-01-06 15:52:22
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v3
漏洞描述
中文描述:
Cayin Signage Media Player是中国台湾凯音(Cayin)公司的一系列电子看板播放终端。 Cayin Signage Media Player 3.0版本存在操作系统命令注入漏洞,该漏洞源于system.cgi和wizard_system.cgi页面存在经过身份验证的远程命令注入漏洞,可能导致以root权限执行任意shell命令。
英文描述:
Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.
CWE类型:
CWE-78
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| CAYIN Technology | SMP-8000QD | 3.0 | - | - |
cpe:2.3:a:cayin_technology:smp-8000qd:3.0:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-8000 | 3.0 | - | - |
cpe:2.3:a:cayin_technology:smp-8000:3.0:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 3.0 Build 19025 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:3.0_build_19025:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14246 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14246:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14199 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14199:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14167 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14167:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14097 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14097:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14090 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14090:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14069 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14069:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-6000 | 1.0 Build 14062 | - | - |
cpe:2.3:a:cayin_technology:smp-6000:1.0_build_14062:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-4000 | 1.0 Build 14098 | - | - |
cpe:2.3:a:cayin_technology:smp-4000:1.0_build_14098:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-4000 | 1.0 Build 14092 | - | - |
cpe:2.3:a:cayin_technology:smp-4000:1.0_build_14092:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-4000 | 1.0 Build 14087 | - | - |
cpe:2.3:a:cayin_technology:smp-4000:1.0_build_14087:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2310 | 3.0 | - | - |
cpe:2.3:a:cayin_technology:smp-2310:3.0:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2300 | 3.0 Build 19316 | - | - |
cpe:2.3:a:cayin_technology:smp-2300:3.0_build_19316:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2210 | 3.0 Build 19025 | - | - |
cpe:2.3:a:cayin_technology:smp-2210:3.0_build_19025:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2200 | 3.0 Build 19029 | - | - |
cpe:2.3:a:cayin_technology:smp-2200:3.0_build_19029:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2200 | 3.0 Build 19025 | - | - |
cpe:2.3:a:cayin_technology:smp-2200:3.0_build_19025:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2100 | 10.0 Build 16228 | - | - |
cpe:2.3:a:cayin_technology:smp-2100:10.0_build_16228:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2100 | 3.0 | - | - |
cpe:2.3:a:cayin_technology:smp-2100:3.0:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2000 | 1.0 Build 14167 | - | - |
cpe:2.3:a:cayin_technology:smp-2000:1.0_build_14167:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-2000 | 1.0 Build 14087 | - | - |
cpe:2.3:a:cayin_technology:smp-2000:1.0_build_14087:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-1000 | 1.0 Build 14099 | - | - |
cpe:2.3:a:cayin_technology:smp-1000:1.0_build_14099:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-PROPLUS | 1.5 Build 10081 | - | - |
cpe:2.3:a:cayin_technology:smp-proplus:1.5_build_10081:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-WEBPLUS | 6.5 Build 11126 | - | - |
cpe:2.3:a:cayin_technology:smp-webplus:6.5_build_11126:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-WEB4 | 2.0 Build 13073 | - | - |
cpe:2.3:a:cayin_technology:smp-web4:2.0_build_13073:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-WEB4 | 2.0 Build 11175 | - | - |
cpe:2.3:a:cayin_technology:smp-web4:2.0_build_11175:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-WEB4 | 1.5 Build 11476 | - | - |
cpe:2.3:a:cayin_technology:smp-web4:1.5_build_11476:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-WEB4 | 1.5 Build 11126 | - | - |
cpe:2.3:a:cayin_technology:smp-web4:1.5_build_11126:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-WEB4 | 1.0 Build 10301 | - | - |
cpe:2.3:a:cayin_technology:smp-web4:1.0_build_10301:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-300 | 1.0 Build 14177 | - | - |
cpe:2.3:a:cayin_technology:smp-300:1.0_build_14177:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-200 | 1.0 Build 13080 | - | - |
cpe:2.3:a:cayin_technology:smp-200:1.0_build_13080:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-200 | 1.0 Build 12331 | - | - |
cpe:2.3:a:cayin_technology:smp-200:1.0_build_12331:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-PRO4 | 1.0 | - | - |
cpe:2.3:a:cayin_technology:smp-pro4:1.0:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-NEO2 | 1.0 | - | - |
cpe:2.3:a:cayin_technology:smp-neo2:1.0:*:*:*:*:*:*:*
|
| CAYIN Technology | SMP-NEO | 1.0 | - | - |
cpe:2.3:a:cayin_technology:smp-neo:1.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
ExploitDB-48557
exploit
cve.org
访问
cve.org
Cayin Technology Official Website
product
cve.org
访问
cve.org
Zero Science Lab Disclosure (ZSL-2020-5569)
third-party-advisory
cve.org
访问
cve.org
Packet Storm Security Exploit Entry
exploit
cve.org
访问
cve.org
IBM X-Force Vulnerability Exchange
vdb-entry
cve.org
访问
cve.org
CXSecurity Vulnerability Listing
exploit
cve.org
访问
cve.org
VulnCheck Advisory: Cayin Signage Media Player 3.0 Authenticated Remote Command Injection via NTP Parameter
third-party-advisory
cve.org
访问
cve.org
CVSS评分详情
4.0 (cna)
HIGH
8.7
CVSS向量:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
机密性
HIGH
完整性
HIGH
可用性
HIGH
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
3.1 (cna)
HIGH
8.8
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2026-01-06 15:52:22
修改时间:
2026-01-06 19:32:13
创建时间:
2026-01-12 02:07:49
更新时间:
2026-01-19 09:29:33
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-36910 |
2026-01-07 02:47:00 | 2026-01-12 02:07:49 |
| NVD | nvd_CVE-2020-36910 |
2026-01-09 03:00:08 | 2026-01-12 02:26:32 |
| CNNVD | cnnvd_CNNVD-202601-1031 |
2026-01-11 06:15:07 | 2026-01-12 02:38:11 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2026-01-12 02:38:11
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-202601-1031; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202601-1031
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2026-01-12 02:26:32
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']