CVE-2020-36973
Remote Code Execution in PDW File Browser via Webshell Upload
Publication date: 2026-01-28
Last updated on: 2026-01-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pdw_file_browser | pdw_file_browser | 1.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in PDW File Browser 1.3 allows authenticated users to upload files that contain webshell code disguised as .txt files. They can then rename these files to .php and move them to arbitrary locations on the web server using double-encoded path traversal techniques, enabling remote code execution.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute arbitrary code on the web server, potentially gaining control over the server or accessing sensitive data. This can lead to unauthorized actions, data breaches, or disruption of services.