We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A client-side remote code execution vulnerability exists in Samsung Security Manager versions 1.32 and 1.4, due to improper restrictions on the PUT method exposed by the bundled Apache ActiveMQ instance (running on port 8161). An attacker can exploit this flaw through a Cross-Origin Resource Sharing (CORS) bypass combined with JavaScript-triggered file uploads to the web server, ultimately resulting in arbitrary code execution with SYSTEM privileges. This vulnerability bypasses the server-side mitigations introduced in ZDI-15-156 and ZDI-16-481 by shifting the exploitation to the client-side. This product is now known as Hanwha Wisenet SSM and it is unknown if current versions are affected.
Reserved 2025-07-23 | Published 2025-07-25 | Updated 2025-07-25 | Assigner VulnCheckCWE-434 Unrestricted Upload of File with Dangerous Type
CWE-306 Missing Authentication for Critical Function
Steven Seeley of Source Incite
raw.githubusercontent.com/...samsung_security_manager_put.rb
www.zerodayinitiative.com/advisories/ZDI-15-156/
www.zerodayinitiative.com/advisories/ZDI-16-481/
web.archive.org/...win.com/product/product_view.asp?idx=6779
srcincite.io/advisories/src-2016-0032/
www.vulncheck.com/...curity-manager-activemq-file-upload-rce
Support options