Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
History

Wed, 31 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
Description Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
Title Selea CarPlateServer 4.0.1.6 Remote Program Execution via Configuration Endpoint
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-31T18:39:08.542Z

Reserved: 2025-12-23T13:21:10.769Z

Link: CVE-2020-36904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-31T19:15:41.557

Modified: 2025-12-31T19:15:41.557

Link: CVE-2020-36904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.