Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xvhq-qrmp-cx9w

Опубликовано: 14 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.

Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.

EPSS

Процентиль: 41%
0.00186
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 9.8
nvd
26 дней назад

Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.

EPSS

Процентиль: 41%
0.00186
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-121