Meinberg Lantime M300 and M1000 devices allow attackers (with privileges to configure a device) to execute arbitrary OS commands by editing the /config/netconf.cmd script (aka Extended Network Configuration). Note: According to the description, the vulnerability requires a fully authenticated super-user account using a webUI function that allows super users to edit a script supposed to execute OS commands. The given weakness enumeration (CWE-78) is not applicable in this case as it refers to abusing functions/input fields not supposed to be accepting OS commands by using 'Special Elements.

Project Subscriptions

Vendors Products
Meinberg Subscribe
Ims-lantime M1000 Subscribe
Lantime M300 Subscribe
Meinbergglobal Subscribe
Lantime M1000 Subscribe
Lantime M1000 Firmware Subscribe
Lantime M300 Subscribe
Lantime M300 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Meinberg
Meinberg ims-lantime M1000
Meinberg lantime M300
CPEs cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*
cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*
Vendors & Products Meinberg
Meinberg ims-lantime M1000
Meinberg lantime M300
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-28T13:28:59.219Z

Reserved: 2020-01-20T00:00:00.000Z

Link: CVE-2020-7240

cve-icon Vulnrichment

Updated: 2024-08-04T09:25:48.448Z

cve-icon NVD

Status : Modified

Published: 2020-01-20T20:15:11.317

Modified: 2024-11-21T05:36:54.123

Link: CVE-2020-7240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses