UBICOD Medivision Digital Signage 1.5.1 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without proper request validation. Attackers can craft a malicious web page that submits a form to the /query/user/itSet endpoint to add a new admin user with elevated privileges.
References
| Link | Resource |
|---|---|
| http://www.medivision.co.kr | Product |
| https://www.exploit-db.com/exploits/48694 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/ubicod-medivision-digital-signage-cross-site-request-forgery-via-user-management | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5574.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5574.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-30 20:30
NVD link : CVE-2020-36901
Mitre link : CVE-2020-36901
CVE.ORG link : CVE-2020-36901
JSON object : View
Products Affected
medivision
- medivision_digital_signage_firmware
- medivision_digital_signage
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
