Description
NetGain EM Plus 10.1.68 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious parameters to the script_test.jsp endpoint. Attackers can send POST requests with shell commands embedded in the 'content' parameter to execute code and retrieve command output.
Published: 2026-03-11
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows unauthenticated attackers to execute arbitrary system commands on the NetGain EM Plus server by sending a POST request to the /script_test.jsp endpoint with malicious content in the 'content' parameter. The flaw arises from improper validation of user-supplied data, classified as a CWE‑94 code injection. Successful exploitation grants full control over the underlying operating system, potentially compromising confidentiality, integrity, and availability of the system.

Affected Systems

The affected vendor is NetGain Systems, product NetGain EM Plus. Information from the CNA indicates only the product name; no specific version numbers are listed in the supplied CNA data. Therefore, any deployment of NetGain EM Plus is potentially vulnerable until further version information is confirmed.

Risk and Exploitability

The CVSS score of 9.3 characterizes this issue as Critical, indicating that an attacker can fully compromise the system without authentication or local access. The EPSS score of less than 1% suggests that the likelihood of exploitation in the wild is currently low, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by crafting a POST request to script_test.jsp; there are no prerequisites beyond unauthenticated network access to the endpoint.

Generated by OpenCVE AI on March 17, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or update to a fixed version of NetGain EM Plus.
  • If a patch is not immediately available, restrict or block inbound traffic to the /script_test.jsp endpoint using firewall or web‑application‑firewall rules.
  • Monitor incoming POST requests to /script_test.jsp for shell command patterns and log any attempts for investigation.

Generated by OpenCVE AI on March 17, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Netgain Systems
Netgain Systems netgain Em Plus
Vendors & Products Netgain Systems
Netgain Systems netgain Em Plus

Wed, 11 Mar 2026 22:30:00 +0000


Wed, 11 Mar 2026 22:00:00 +0000


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description NetGain EM Plus 10.1.68 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious parameters to the script_test.jsp endpoint. Attackers can send POST requests with shell commands embedded in the 'content' parameter to execute code and retrieve command output.
Title NetGain EM Plus 10.1.68 Remote Code Execution via script_test.jsp
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Netgain Systems Netgain Em Plus
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:04:26.882Z

Reserved: 2026-02-22T14:41:00.791Z

Link: CVE-2019-25468

cve-icon Vulnrichment

Updated: 2026-03-11T19:23:04.048Z

cve-icon NVD

Status : Deferred

Published: 2026-03-11T19:16:00.220

Modified: 2026-04-15T14:56:45.970

Link: CVE-2019-25468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:50Z

Weaknesses