Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Oct 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | AMTT Hotel Broadband Operation System (HiBOS) contains an unauthenticated command injection vulnerability in the /manager/radius/server_ping.php endpoint. The application constructs a shell command that includes the user-supplied ip parameter and executes it without proper validation or escaping. An attacker can insert shell metacharacters into the ip parameter to inject and execute arbitrary system commands as the web server user. The initial third-party disclosure in 2016 recommended contacting the vendor for remediation guidance. Additionally, this product may have been rebranded under a different name. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-14 at 04:45:53.510819 UTC. | |
Title | AMTT HiBOS Command Injection RCE via server_ping.php | |
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-22T14:34:46.683Z
Reserved: 2025-10-21T15:54:39.430Z
Link: CVE-2016-15048

Updated: 2025-10-22T14:34:30.946Z

Status : Awaiting Analysis
Published: 2025-10-22T15:15:30.923
Modified: 2025-10-22T21:12:48.953
Link: CVE-2016-15048

No data.

No data.