Description
RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system commands to execute arbitrary operations on the target system, including reverse shell establishment and command execution.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Credits
indoushka
References
packetstorm.news/files/id/215819/ (PacketStorm-215819)
www.vulncheck.com/...ommand-injection-via-udp-remote-control (VulnCheck Advisory: RustFly 2.0.0 Command Injection via UDP Remote Control)