Description
The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.
Published: 2022-12-06
Score: 9.8 Critical
EPSS: 14.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-27775 The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.
History

Wed, 23 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Seagate Stcg2000300 Stcg2000300 Firmware Stcg3000300 Stcg3000300 Firmware Stcg4000300 Stcg4000300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-23T14:51:26.204Z

Reserved: 2020-01-09T00:00:00.000Z

Link: CVE-2020-6627

cve-icon Vulnrichment

Updated: 2024-08-04T09:11:04.853Z

cve-icon NVD

Status : Modified

Published: 2022-12-06T15:15:15.730

Modified: 2025-04-23T15:15:46.020

Link: CVE-2020-6627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses