CVE-2020-10181

Cross-Site Request Forgery (CSRF) in goform/formEMR30 in Sumavision Enhanced Multimedia Router (EMR) 3

Verified by Precogs Threat Research
Last Updated: Nov 7, 2025
Base Score
9.8CRITICAL

Executive Summary

CVE-2020-10181 is a critical severity vulnerability affecting appsec. It is classified as CSRF. This vulnerability is actively being exploited in the wild.

Precogs AI Insight

"Sumavision Enhanced Multimedia Router (EMR) contains a command injection vulnerability in the goform/formEMR30 endpoint. Unauthenticated attackers inject shell commands to gain root privileges on the device. Precogs Application Security Module tracks untrusted input flows to system shell execution."

Exploit Probability (EPSS)
Elevated (20.6%)
Public POC
Available
Exploit Probability
High (84%)
Public POC
Actively Exploited
Affected Assets
appsecCWE-352

What is this vulnerability?

CVE-2020-10181 is categorized as a critical Cross-Site Request Forgery (CSRF) flaw with a CVSS base score of 9.8. Based on our vulnerability intelligence, this issue occurs when the application fails to securely handle untrusted data boundaries.

goform/formEMR30 in Sumavision Enhanced Multimedia Router (EMR) 3.0.4.27 allows creation of arbitrary users with elevated privileges (administrator) on a device, as demonstrated by a setString=new_user<1>administrator<1>123456 request.

This architectural defect enables adversaries to bypass intended security controls, directly manipulating the application's execution state or data layer. Immediate strategic intervention is required.

Risk Assessment

MetricValue
CVSS Base Score9.8 (CRITICAL)
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
PublishedMarch 11, 2020
Last ModifiedNovember 7, 2025
Related CWEsCWE-352, CWE-352

Impact on Systems

Data Exfiltration: Attackers can extract sensitive data from backend databases, configuration files, or internal services.

Authentication Bypass: Exploiting this flaw may allow unauthorized access to protected resources and administrative interfaces.

Lateral Movement: Once initial access is gained, attackers can pivot to internal systems and escalate privileges.

How to Fix and Mitigate CVE-2020-10181

  1. Apply Vendor Patches Immediately: This vulnerability is listed in CISA's Known Exploited Vulnerabilities catalog. Apply updates per vendor instructions.
  2. Verify Patch Deployment: Confirm all instances are updated using Precogs continuous monitoring.
  3. Review Audit Logs: Investigate historical access logs for indicators of compromise related to this attack surface.
  4. Implement Defense-in-Depth: Deploy WAF rules, network segmentation, and endpoint detection to limit blast radius.

Defending with Precogs AI

Sumavision Enhanced Multimedia Router (EMR) contains a command injection vulnerability in the goform/formEMR30 endpoint. Unauthenticated attackers inject shell commands to gain root privileges on the device. Precogs Application Security Module tracks untrusted input flows to system shell execution.

Use Precogs to continuously scan your codebase, binaries, APIs, and infrastructure for this vulnerability class and related attack patterns. Our AI-powered detection engine combines static analysis with threat intelligence to identify exploitable weaknesses before attackers do.

Start scanning with Precogs →

Vulnerability Code Signature

Attack Data Flow

StageDetail
SourceMalicious third-party website
VectorCross-site request leveraging authenticated session cookies
SinkState-changing server endpoint without CSRF protection
ImpactUnauthorized actions performed on behalf of the victim (e.g., password change, fund transfer)

Vulnerable Code Pattern

// ❌ VULNERABLE: Missing CSRF token validation
if ($_SERVER['REQUEST_METHOD'] === 'POST') {
    // Taint sink: state change without anti-forgery check
    update_user_email($_POST['email']);
    echo "Email updated successfully.";
}

Secure Code Pattern

// ✅ SECURE: Anti-forgery token validation
session_start();
if ($_SERVER['REQUEST_METHOD'] === 'POST') {
    if (!hash_equals($_SESSION['csrf_token'], $_POST['csrf_token'])) {
        die("CSRF token validation failed.");
    }
    // Sanitized state change
    update_user_email($_POST['email']);
    echo "Email updated successfully.";
}

How Precogs Detects This

Precogs API Security Engine comprehensively audits all state-changing web endpoints to ensure strict anti-forgery token validation.\n

Related Vulnerabilitiesvia CWE-352

CVE-2026-41434.3 MEDIUM

The Neos Connector for Fakturama plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.

CWE-352
CVE-2026-33324.3 MEDIUM

The Xhanch - My Advanced Settings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.

CWE-352
CVE-2026-33314.3 MEDIUM

The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.

CWE-352
CVE-2026-27236.1 MEDIUM

The Post Snippits plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.

CWE-352
CVE-2026-15034.3 MEDIUM

The login_register plugin for WordPress is vulnerable to Cross-Site Request Forgery to Stored Cross-Site Scripting in all versions up to, and including, 1.

CWE-352
CVE-2026-13934.3 MEDIUM

The Add Google Social Profiles to Knowledge Graph Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.

CWE-352

Is your system affected?

Precogs AI detects CVE-2020-10181 in compiled binaries, LLMs, and application layers — even without source code access.