Description
Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attackers to execute arbitrary Windows binaries by manipulating the NO_LIST_EXE_PATH configuration parameter. Attackers can bypass authentication through the /cps/ endpoint and modify server configuration, including changing admin passwords and executing system commands.
Problem types
Missing Authentication for Critical Function
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/49452 (ExploitDB-49452)
www.selea.com (Vendor Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5622.php (Zero Science Lab Disclosure (ZSL-2021-5622))
www.vulncheck.com/...am-execution-via-configuration-endpoint (VulnCheck Advisory: Selea CarPlateServer 4.0.1.6 Remote Program Execution via Configuration Endpoint)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.