Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2023-33246 | Apache RocketMQ Command Execution Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited by a remote attacker who leverages a command injection flaw in Apache RocketMQ versions 5.1 and lower. By using the update configuration function, the adversary can execute commands as the system user under which RocketMQ is running. This lack of permission verification in components like NameServer, Broker, and Controller, which are exposed on the extranet, allows for remote command execution. Additionally, attackers can forge RocketMQ protocol content to achieve the same effect. Since at least June 2023, threat actors have actively exploited this vulnerability to gain initial access and deploy the DreamBus botnet, a Linux-based malware.
References
|
CVE-2023-33246 | Apache RocketMQ Command Execution Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This vulnerability is exploited by a remote attacker who leverages a command injection flaw in Apache RocketMQ versions 5.1 and lower. By using the update configuration function, the adversary can execute commands as the system user under which RocketMQ is running. This lack of permission verification in components like NameServer, Broker, and Controller, which are exposed on the extranet, allows for remote command execution. Additionally, attackers can forge RocketMQ protocol content to achieve the same effect. Since at least June 2023, threat actors have actively exploited this vulnerability to gain initial access and deploy the DreamBus botnet, a Linux-based malware.
References
|
CVE-2023-33246 | Apache RocketMQ Command Execution Vulnerability | secondary_impact | T1608.001 | Upload Malware |
Comments
This vulnerability is exploited by a remote attacker who leverages a command injection flaw in Apache RocketMQ versions 5.1 and lower. By using the update configuration function, the adversary can execute commands as the system user under which RocketMQ is running. This lack of permission verification in components like NameServer, Broker, and Controller, which are exposed on the extranet, allows for remote command execution. Additionally, attackers can forge RocketMQ protocol content to achieve the same effect. Since at least June 2023, threat actors have actively exploited this vulnerability to gain initial access and deploy the DreamBus botnet, a Linux-based malware.
References
|
CVE-2021-42237 | Sitecore XP Remote Command Execution Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE 2021-42237related to a remote code execution vulnerability through insecure deserialization.
References
|
CVE-2025-1316 | Edimax IC-7100 IP Camera OS Command Injection Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
Due to improper input sanitization, the web interface of the Edimax IC-7100 contains a vulnerability that allows for a user to send a crafted HTTP request containing a malicious command(s), which the camera's OS can be forced to execute.
References
|
CVE-2025-1316 | Edimax IC-7100 IP Camera OS Command Injection Vulnerability | primary_impact | T1055 | Process Injection | |
CVE-2024-40891 | Zyxel DSL CPE OS Command Injection Vulnerability | exploitation_technique | T1055 | Process Injection |
Comments
Zyxel CPE devices contain a Telnet interface that fails to properly sanitize input containing special characters, which facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise.
References
|
CVE-2024-40891 | Zyxel DSL CPE OS Command Injection Vulnerability | primary_impact | T1011 | Exfiltration Over Other Network Medium |
Comments
Zyxel CPE devices contain a Telnet interface that fails to properly sanitize input containing special characters, which facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise.
References
|
CVE-2024-40890 | Zyxel DSL CPE OS Command Injection Vulnerability | exploitation_technique | T1055 | Process Injection |
Comments
Zyxel CPE contain an HTTP-based vulnerability that facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise. No public proof-of-concept exists for this exploit, and Zyxel has no intention of patching the vulnerability since the devices affected are end-of-life.
References
|
CVE-2024-40890 | Zyxel DSL CPE OS Command Injection Vulnerability | primary_impact | T1011 | Exfiltration Over Other Network Medium |
Comments
Zyxel CPE contain an HTTP-based vulnerability that facilitates code execution that can lead to data exfiltration, network infiltration, and total system compromise. No public proof-of-concept exists for this exploit, and Zyxel has no intention of patching the vulnerability since the devices affected are end-of-life.
References
|