Description
Meinberg Lantime M300 and M1000 devices allow attackers (with privileges to configure a device) to execute arbitrary OS commands by editing the /config/netconf.cmd script (aka Extended Network Configuration). Note: According to the description, the vulnerability requires a fully authenticated super-user account using a webUI function that allows super users to edit a script supposed to execute OS commands. The given weakness enumeration (CWE-78) is not applicable in this case as it refers to abusing functions/input fields not supposed to be accepting OS commands by using 'Special Elements.
Published: 2020-01-20
Score: 8.8 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Meinberg
Meinberg ims-lantime M1000
Meinberg lantime M300
CPEs cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*
cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*
Vendors & Products Meinberg
Meinberg ims-lantime M1000
Meinberg lantime M300
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Meinberg Ims-lantime M1000 Lantime M300
Meinbergglobal Lantime M1000 Lantime M1000 Firmware Lantime M300 Lantime M300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-28T13:28:59.219Z

Reserved: 2020-01-20T00:00:00.000Z

Link: CVE-2020-7240

cve-icon Vulnrichment

Updated: 2024-08-04T09:25:48.448Z

cve-icon NVD

Status : Modified

Published: 2020-01-20T20:15:11.317

Modified: 2024-11-21T05:36:54.123

Link: CVE-2020-7240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses