Summary
WAN Emulator is prone to a remote command-execution vulnerability because it fails to properly sanitize user-supplied input.
Exploiting these issues could allow an attacker to execute arbitrary commands within the context of the affected application.
WAN Emulator 2.3 is vulnerable
other versions may also
be affected.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Artmedic Kleinanzeigen File Inclusion Vulnerability
- Advantech WebAccess Multiple Vulnerabilities
- Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object Remote Code Execution
- Atlassian JIRA Privilege Escalation and Multiple Cross Site Scripting Vulnerabilities
- ActualAnalyzer Lite 'ant' Cookie Parameter Remote Command Execution Vulnerability