Description
A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-19
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

An OS command injection flaw was discovered in the qq function of the /cgi-bin/session_login.cgi script in SECCN Dingcheng G10 3.1.0.181203. By supplying a crafted User argument, an attacker can execute arbitrary operating‑system commands on the web server. The vulnerability is both a command injection (CWE‑77) and an operating‑system command injection (CWE‑78) issue, allowing an attacker to compromise confidentiality, integrity, and availability of the affected host.

Affected Systems

This vulnerability affects SECCN Dingcheng’s G10 web server component, specifically version 3.1.0.181203. No other versions or products are listed, so the affected scope is limited to installations running that exact build of G10.

Risk and Exploitability

The flaw carries a CVSS base score of 9.3, indicating a high‑severity risk. While the EPSS score is below 1 %, indicating low probability of exploitation in the wild, the exploit has already been disclosed publicly and could be used remotely if the vulnerable script is reachable over the network. The attack vector is network‑based, requiring no authentication or local access, and it exploits unchecked user input that is directly passed to a system command.

Generated by OpenCVE AI on April 17, 2026 at 18:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SECCN Dingcheng G10 to a version that includes the vendor’s fix for the sys command injection in session_login.cgi.
  • If an updated version is not immediately available, restrict external access to /cgi-bin/session_login.cgi using firewall or web application firewall rules to limit exposure.
  • Apply manual input validation or sanitization on the User parameter to prevent unsanitized command execution, ensuring that only legitimate login data is processed.

Generated by OpenCVE AI on April 17, 2026 at 18:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Seccn Dingcheng
Seccn Dingcheng g10
Vendors & Products Seccn Dingcheng
Seccn Dingcheng g10

Thu, 19 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Title SECCN Dingcheng G10 session_login.cgi qq os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Seccn Dingcheng G10
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T15:49:44.615Z

Reserved: 2026-02-18T14:09:31.781Z

Link: CVE-2026-2686

cve-icon Vulnrichment

Updated: 2026-02-24T15:49:40.472Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T00:16:22.143

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2686

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:30:05Z

Weaknesses