Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-53XR-PV5P-MHRG
Vulnerability from github – Published: 2026-01-06 18:31 – Updated: 2026-01-06 18:31
VLAI?
Details
Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2020-36910"
],
"database_specific": {
"cwe_ids": [
"CWE-78"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-06T16:15:46Z",
"severity": "HIGH"
},
"details": "Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the \u0027NTP_Server_IP\u0027 parameter with default credentials to execute arbitrary shell commands as root.",
"id": "GHSA-53xr-pv5p-mhrg",
"modified": "2026-01-06T18:31:34Z",
"published": "2026-01-06T18:31:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36910"
},
{
"type": "WEB",
"url": "https://cxsecurity.com/issue/WLB-2020060049"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182924"
},
{
"type": "WEB",
"url": "https://packetstorm.news/files/id/157942"
},
{
"type": "WEB",
"url": "https://www.cayintech.com"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/48557"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/cayin-signage-media-player-authenticated-remote-command-injection-via-ntp-parameter"
},
{
"type": "WEB",
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5569.php"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
CVE-2020-36910 (GCVE-0-2020-36910)
Vulnerability from cvelistv5 – Published: 2026-01-06 15:52 – Updated: 2026-01-06 19:32
VLAI?
EPSS
Title
Cayin Signage Media Player 3.0 Authenticated Remote Command Injection via NTP Parameter
Summary
Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.
Severity ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CAYIN Technology | SMP-8000QD |
Affected:
3.0
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-36910",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-06T19:31:33.067714Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-06T19:32:13.853Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "SMP-8000QD",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0"
}
]
},
{
"product": "SMP-8000",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0"
}
]
},
{
"product": "SMP-6000",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0 Build 19025"
},
{
"status": "affected",
"version": "1.0 Build 14246"
},
{
"status": "affected",
"version": "1.0 Build 14199"
},
{
"status": "affected",
"version": "1.0 Build 14167"
},
{
"status": "affected",
"version": "1.0 Build 14097"
},
{
"status": "affected",
"version": "1.0 Build 14090"
},
{
"status": "affected",
"version": "1.0 Build 14069"
},
{
"status": "affected",
"version": "1.0 Build 14062"
}
]
},
{
"product": "SMP-4000",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0 Build 14098"
},
{
"status": "affected",
"version": "1.0 Build 14092"
},
{
"status": "affected",
"version": "1.0 Build 14087"
}
]
},
{
"product": "SMP-2310",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0"
}
]
},
{
"product": "SMP-2300",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0 Build 19316"
}
]
},
{
"product": "SMP-2210",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0 Build 19025"
}
]
},
{
"product": "SMP-2200",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "3.0 Build 19029"
},
{
"status": "affected",
"version": "3.0 Build 19025"
}
]
},
{
"product": "SMP-2100",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "10.0 Build 16228"
},
{
"status": "affected",
"version": "3.0"
}
]
},
{
"product": "SMP-2000",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0 Build 14167"
},
{
"status": "affected",
"version": "1.0 Build 14087"
}
]
},
{
"product": "SMP-1000",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0 Build 14099"
}
]
},
{
"product": "SMP-PROPLUS",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.5 Build 10081"
}
]
},
{
"product": "SMP-WEBPLUS",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "6.5 Build 11126"
}
]
},
{
"product": "SMP-WEB4",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "2.0 Build 13073"
},
{
"status": "affected",
"version": "2.0 Build 11175"
},
{
"status": "affected",
"version": "1.5 Build 11476"
},
{
"status": "affected",
"version": "1.5 Build 11126"
},
{
"status": "affected",
"version": "1.0 Build 10301"
}
]
},
{
"product": "SMP-300",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0 Build 14177"
}
]
},
{
"product": "SMP-200",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0 Build 13080"
},
{
"status": "affected",
"version": "1.0 Build 12331"
}
]
},
{
"product": "SMP-PRO4",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
},
{
"product": "SMP-NEO2",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
},
{
"product": "SMP-NEO",
"vendor": "CAYIN Technology",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "LiquidWorm as Gjoko Krstic of Zero Science Lab"
}
],
"datePublic": "2020-06-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the \u0027NTP_Server_IP\u0027 parameter with default credentials to execute arbitrary shell commands as root."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS"
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-06T15:52:22.576Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "ExploitDB-48557",
"tags": [
"exploit"
],
"url": "https://www.exploit-db.com/exploits/48557"
},
{
"name": "Cayin Technology Official Website",
"tags": [
"product"
],
"url": "https://www.cayintech.com"
},
{
"name": "Zero Science Lab Disclosure (ZSL-2020-5569)",
"tags": [
"third-party-advisory"
],
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5569.php"
},
{
"name": "Packet Storm Security Exploit Entry",
"tags": [
"exploit"
],
"url": "https://packetstorm.news/files/id/157942"
},
{
"name": "IBM X-Force Vulnerability Exchange",
"tags": [
"vdb-entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182924"
},
{
"name": "CXSecurity Vulnerability Listing",
"tags": [
"exploit"
],
"url": "https://cxsecurity.com/issue/WLB-2020060049"
},
{
"name": "VulnCheck Advisory: Cayin Signage Media Player 3.0 Authenticated Remote Command Injection via NTP Parameter",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/cayin-signage-media-player-authenticated-remote-command-injection-via-ntp-parameter"
}
],
"title": "Cayin Signage Media Player 3.0 Authenticated Remote Command Injection via NTP Parameter",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2020-36910",
"datePublished": "2026-01-06T15:52:22.576Z",
"dateReserved": "2026-01-03T14:10:13.300Z",
"dateUpdated": "2026-01-06T19:32:13.853Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…