{"id":"CVE-2023-0647","details":"A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.","modified":"2026-04-10T04:53:57.981208Z","published":"2023-02-02T15:17:40.627Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?ctiid.220034"},{"type":"ADVISORY","url":"https://vuldb.com/?id.220034"},{"type":"EVIDENCE","url":"https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qinming99/dst-admin","events":[{"introduced":"0"},{"last_affected":"7e9fdc3fe7e96a5badb5ce9922a365351494d525"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.5.0"}]}}],"versions":["1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.1.0","v1.2.0","v1.3.0","v1.3.1","v1.4.0","v1.5.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0647.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}