CVE-2015-1497
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
16/02/2015
Last modified:
12/04/2025
Description
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:persistent_systems:radia_client_automation:7.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:persistent_systems:radia_client_automation:8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:persistent_systems:radia_client_automation:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:persistent_systems:radia_client_automation:9.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/show/osvdb/118382
- http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html
- http://www.exploit-db.com/exploits/36169
- http://www.exploit-db.com/exploits/36206
- http://www.securityfocus.com/bid/72612
- http://www.zerodayinitiative.com/advisories/ZDI-15-038/
- https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features
- https://www.exploit-db.com/exploits/40491/
- http://osvdb.org/show/osvdb/118382
- http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html
- http://www.exploit-db.com/exploits/36169
- http://www.exploit-db.com/exploits/36206
- http://www.securityfocus.com/bid/72612
- http://www.zerodayinitiative.com/advisories/ZDI-15-038/
- https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features
- https://www.exploit-db.com/exploits/40491/



