Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.

Project Subscriptions

Vendors Products
Wcchandler Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wcchandler
Wcchandler pinger
Vendors & Products Wcchandler
Wcchandler pinger

Thu, 05 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.
Title Pinger 1.0 - Remote Code Execution
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-06T20:34:31.207Z

Reserved: 2026-02-03T16:27:45.304Z

Link: CVE-2020-37123

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-05T17:16:06.890

Modified: 2026-02-05T20:47:37.777

Link: CVE-2020-37123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-06T12:05:14Z

Weaknesses