Home

Description

meterN 1.2.3 contains an authenticated remote code execution vulnerability in admin_meter2.php and admin_indicator2.php scripts. Attackers can exploit the 'COMMANDx' and 'LIVECOMMANDx' POST parameters to execute arbitrary system commands with administrative privileges.

PUBLISHED Reserved 2025-12-31 | Published 2025-12-31 | Updated 2026-01-05 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

1.2.3
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/50596 (ExploitDB-50596) exploit

web.archive.org/web/20210617084455/https://www.metern.org/ (Archived Vendor Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5690.php (Zero Science Lab Disclosure (ZSL-2021-5690)) third-party-advisory

www.vulncheck.com/...remote-code-execution-via-admin-scripts (VulnCheck Advisory: meterN 1.2.3 Authenticated Remote Code Execution via Admin Scripts) third-party-advisory

cve.org (CVE-2021-47747)

nvd.nist.gov (CVE-2021-47747)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.