Impact
The vulnerability is an OS command injection in sar2html’s index.php via the plot parameter. User input is passed directly to the operating system without sanitization, allowing attackers to append arbitrary shell commands. Successful exploitation results in full command execution on the host, giving an attacker complete control over the server.
Affected Systems
The affected product is sar2html, any deployment running version 3.2.2 or earlier of the application.
Risk and Exploitability
The CVSS score of 10 indicates a high‑severity flaw, and the EPSS score of 4% signals that exploitation is considered likely. The vulnerability is not listed in the KEV catalog, but remote, unauthenticated attackers can trigger it by crafting a GET request with a malicious plot value such as ?plot=;id. Exploit evidence was reported by the Shadowserver Foundation in February 2025.
OpenCVE Enrichment
EUVD