A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentication may be required depending on deployment configuration.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gestioip
Gestioip gestioip |
|
Vendors & Products |
Gestioip
Gestioip gestioip |
Thu, 31 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 31 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentication may be required depending on deployment configuration. | |
Title | GestioIP 3.0 ip_checkhost.cgi RCE | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-31T14:55:54.624Z
Updated: 2025-07-31T15:13:16.183Z
Reserved: 2025-07-30T17:40:00.555Z
Link: CVE-2013-10039

Updated: 2025-07-31T15:13:12.977Z

Status : Awaiting Analysis
Published: 2025-07-31T15:15:33.753
Modified: 2025-07-31T18:42:37.870
Link: CVE-2013-10039

No data.