In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
lists.opensuse.org/opensuse-security-announce/2019-08/msg00080.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00085.html
github.com/qbittorrent/qBittorrent/issues/10925
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T4XAX2VUI4WMAS5AI4OE3OEQSQCDCF5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH3WYCKODG4OKMC4S6PWHLHAWWU6ORNC/
www.debian.org/security/2020/dsa-4650