{"api_version":"1","generated_at":"2026-04-17T12:38:43+00:00","cve":"CVE-2020-21999","urls":{"html":"https://cve.report/CVE-2020-21999","api":"https://cve.report/api/cve/CVE-2020-21999.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-21999","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-21999"},"summary":{"title":"CVE-2020-21999","description":"iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-05-04 16:15:00","updated_at":"2021-05-11 19:22:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://www.exploit-db.com/exploits/47066","name":"Exploit Database","refsource":"EXPLOIT-DB","tags":[],"title":"FaceSentry Access Control System 6.4.8 - Remote Root Exploit - Hardware webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php","name":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php","refsource":"MISC","tags":[],"title":"Zero Science Lab » FaceSentry Access Control System 6.4.8 Remote Root Exploit","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-21999","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-21999","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"21999","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"iwt","cpe5":"facesentry_access_control_system","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"21999","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"iwt","cpe5":"facesentry_access_control_system_firmware","cpe6":"5.7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"21999","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"iwt","cpe5":"facesentry_access_control_system_firmware","cpe6":"5.7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"21999","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"iwt","cpe5":"facesentry_access_control_system_firmware","cpe6":"6.4.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-21999","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php","refsource":"MISC","name":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5525.php"},{"refsource":"EXPLOIT-DB","name":"Exploit Database","url":"https://www.exploit-db.com/exploits/47066"}]}},"nvd":{"publishedDate":"2021-05-04 16:15:00","lastModifiedDate":"2021-05-11 19:22:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:iwt:facesentry_access_control_system_firmware:6.4.8:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"21999","Ordinal":"183408","Title":"CVE-2020-21999","CVE":"CVE-2020-21999","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"21999","Ordinal":"1","NoteData":"iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"21999","Ordinal":"2","NoteData":"2021-05-04","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"21999","Ordinal":"3","NoteData":"2021-05-04","Type":"Other","Title":"Modified"}]}}}