Description
Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
Published: 2025-12-31
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Vendors & Products Microsoft
Microsoft windows

Fri, 02 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 31 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
Description Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
Title Selea CarPlateServer 4.0.1.6 Remote Program Execution via Configuration Endpoint
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-02T20:16:14.728Z

Reserved: 2025-12-23T13:21:10.769Z

Link: CVE-2020-36904

cve-icon Vulnrichment

Updated: 2026-01-02T20:16:06.256Z

cve-icon NVD

Status : Deferred

Published: 2025-12-31T19:15:41.557

Modified: 2026-04-15T00:35:42.020

Link: CVE-2020-36904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:15:15Z

Weaknesses