We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling. Versions 7.4 and below are known to be vulnerable.
Reserved 2025-03-21 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheckCWE-20 Improper Input Validation
Valentin Lobstein (Chocapikk)
github.com/rapid7/metasploit-framework/pull/20446
Support options