Impact
Key detail from CVE description: "A security vulnerability has been detected in whyour qinglong up to 2.20.1 ... The manipulation of the argument command leads to protection mechanism failure." The vulnerability is caused by improper handling of the command argument within the API interface (back/loaders/express.ts), which disables the intended protection mechanism. Key detail from CVE description: "The attack may be initiated remotely." The primary impact is the loss of this protection, as identified by CWE‑693 (System Not Adequately Protected).
Affected Systems
Key detail from CVE description: "Systems running whyour qinglong version 2.20.1 or earlier are affected." The patch is available in release 2.20.2, identified by commit 6bec52dca158481258315ba0fc2f11206df7b719, which removes the vulnerability. The affected products are listed under the vendor name "whyour:qinglong".
Risk and Exploitability
Key detail from CVE description: "The CVSS Score: 5.3" and "EPSS Score: < 1%" indicate moderate severity and low exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack can be performed remotely by sending crafted requests to the API endpoint, and it has already been publicly disclosed and may be used.
OpenCVE Enrichment
Github GHSA