Remote Code Execution Vulnerability in PDW File Browser by Michal Chrzanowski
CVE-2020-36973
Key Information:
- Vendor
Michalc
- Status
- Vendor
- CVE Published:
- 28 January 2026
Badges
What is CVE-2020-36973?
PDW File Browser version 1.3 is susceptible to a remote code execution vulnerability, allowing authenticated users to exploit path traversal techniques to upload and rename malicious webshell files. By double-encoding path segments, an attacker can craft a file upload request that leads to unauthorized file placements in accessible directories. This type of attack can facilitate further exploitation, as attackers can run arbitrary code on the server by effectively disguising the malicious payload as a legitimate file.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
PDW File Browser <=1.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
