Home

Description

IPCop versions up to and including 2.1.9 contain an authenticated remote code execution vulnerability within the web-based administration interface. The email configuration component inserts user-controlled values, including the EMAIL_PW parameter, directly into system-level operations without proper input sanitation. By modifying the email password field to include shell metacharacters and issuing a save-and-test-mail action, an authenticated attacker can execute arbitrary operating system commands with the privileges of the web interface, resulting in full system compromise.

PUBLISHED Reserved 2025-11-14 | Published 2025-11-14 | Updated 2025-11-17 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

Any version
affected

Timeline

2021-08-10:ExploitDB-50183 is publicly disclosed.

Credits

Mücahit Saratar finder

References

www.exploit-db.com/exploits/50183 exploit

www.ipcop.org/ product

sourceforge.net/projects/ipcop/ product

www.vulncheck.com/advisories/ipcop-authenticated-rce third-party-advisory

cve.org (CVE-2021-4466)

nvd.nist.gov (CVE-2021-4466)

Download JSON