Cyber Posture

CVE-2020-36910

HighPublic PoCRCE

Published: 06 January 2026

Published
06 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0053 67.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-36910 is a high-severity OS Command Injection (CWE-78) vulnerability in Cxsecurity (inferred from references). Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2020-36910 by identifying, patching, or updating the vulnerable CGI scripts to eliminate the command injection flaw.

prevent

Prevents exploitation of the NTP_Server_IP parameter by validating inputs to reject command injection payloads containing shell metacharacters.

prevent

Reduces attack surface by disabling default credentials or enforcing strong account management, hindering authenticated access needed to exploit the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Authenticated remote command injection in web CGI endpoints enables exploitation of public-facing application (T1190), arbitrary Unix shell execution (T1059.004), and privilege escalation from low-priv to root (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.

Deeper analysisAI

CVE-2020-36910 is an authenticated remote command injection vulnerability (CWE-78) affecting Cayin Signage Media Player 3.0, specifically in the system.cgi and wizard_system.cgi pages. The flaw resides in the 'NTP_Server_IP' parameter, which attackers can exploit using default credentials to execute arbitrary shell commands as root. Published on 2026-01-06, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low complexity, and potential for complete system compromise.

An attacker requires network access to the affected device and valid low-privilege credentials, such as the defaults provided by the software. Once authenticated, they can submit a malicious payload via the vulnerable 'NTP_Server_IP' parameter in the specified CGI pages, leading to remote code execution with root privileges. This grants high-impact control over confidentiality, integrity, and availability, allowing arbitrary command execution on the target system.

Advisories and additional details, including potential exploits, are documented in references such as https://cxsecurity.com/issue/WLB-2020060049, https://exchange.xforce.ibmcloud.com/vulnerabilities/182924, https://packetstorm.news/files/id/157942, https://www.cayintech.com, and https://www.exploit-db.com/exploits/48557. Security practitioners should consult these sources and the vendor for patch availability or mitigation guidance.

Details

CWE(s)

Affected Products

Cxsecurity
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-56102Shared CWE-78
CVE-2026-31019Shared CWE-78
CVE-2026-26943Shared CWE-78
CVE-2026-28269Shared CWE-78
CVE-2021-47816Shared CWE-78
CVE-2025-56098Shared CWE-78
CVE-2026-28774Shared CWE-78
CVE-2025-60957Shared CWE-78
CVE-2025-20029Shared CWE-78
CVE-2026-28773Shared CWE-78

References