Cyber Posture

CVE-2020-37009

HighPublic PoC

Published: 29 January 2026

Published
29 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0030 53.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated…

more

privileges.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly counters insufficient validation of uploaded files by requiring checks to block malicious PHP shells at the uploadImage.php endpoint.

prevent

Mandates timely remediation and patching of the specific flaw in MedDream PACS Server version 6.8.3.751 to prevent authenticated RCE exploitation.

preventdetect

Deploys malicious code protection mechanisms to scan and block uploaded PHP shells before they can be executed with elevated privileges.

Security SummaryAI

CVE-2020-37009 is an authenticated remote code execution vulnerability in MedDream PACS Server version 6.8.3.751. The flaw resides in the uploadImage.php endpoint, which allows authorized users to upload malicious PHP files, such as a PHP shell, due to insufficient validation of uploaded files. This issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity.

Attackers with low-privilege authenticated access can exploit the vulnerability remotely over the network with low complexity and no user interaction required. By authenticating to the server and uploading a malicious PHP file via the uploadImage.php endpoint, they can achieve remote code execution, enabling arbitrary system commands to be run with elevated privileges. This grants high impacts on confidentiality, integrity, and availability, potentially leading to full server compromise.

Advisories and references, including a VulnCheck advisory on MedDream PACS Server remote code execution, Exploit-DB entries (ID 48853) with proof-of-concept exploits, and the MedDream product page, provide further technical details. Security practitioners should review these sources for exploitation vectors and verify vendor guidance on patches or mitigations, as no specific remediation details are outlined in the core vulnerability description.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The vulnerability allows authenticated RCE via unrestricted upload of malicious PHP files (web shell) to a public-facing web application (uploadImage.php endpoint), directly mapping to T1190 (Exploit Public-Facing Application) and facilitating T1505.003 (Web Shell deployment for command execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References