Home

Description

QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.

PUBLISHED Reserved 2025-12-09 | Published 2025-12-10 | Updated 2025-12-11 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

3.0.9
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php exploit

www.exploit-db.com/exploits/48751 (ExploitDB-48751) exploit

www.howfor.com (Official Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php (Vendor Security Advisory for ZSL-2020-5582) vendor-advisory

www.vulncheck.com/...e-unauthenticated-remote-code-execution (VulnCheck Advisory: QiHang Media Web Digital Signage 3.0.9 Unauthenticated Remote Code Execution) third-party-advisory

cve.org (CVE-2020-36897)

nvd.nist.gov (CVE-2020-36897)

Download JSON