Home

Description

MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated privileges.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-29 | Updated 2026-01-29 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unrestricted Upload of File with Dangerous Type

Product status

6.8.3.751
affected

Credits

bzyo finder

References

www.exploit-db.com/exploits/48853 exploit

www.exploit-db.com/exploits/48853 (ExploitDB-48853) exploit

meddream.com/products/meddream-pacs-server/ (MedDream PACS Server Product Page) product

www.vulncheck.com/...dream-pacs-server-remote-code-execution (VulnCheck Advisory: MedDream PACS Server 6.8.3.751 - Remote Code Execution) third-party-advisory

cve.org (CVE-2020-37009)

nvd.nist.gov (CVE-2020-37009)

Download JSON