Versions 7.4 and below are known to be vulnerable.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://github.com/rapid7/metasploit-framework/pull/20446 |
![]() ![]() |
Wed, 06 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ict Innovations
Ict Innovations ictbroadcast |
|
Vendors & Products |
Ict Innovations
Ict Innovations ictbroadcast |
Tue, 05 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling. Versions 7.4 and below are known to be vulnerable. | |
Title | ICTBroadcast Unauthenticated Session Cookie Remote Code Execution | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-06T16:13:05.773Z
Reserved: 2025-03-21T14:48:20.392Z
Link: CVE-2025-2611

Updated: 2025-08-05T15:06:08.142Z

Status : Awaiting Analysis
Published: 2025-08-05T15:15:29.127
Modified: 2025-08-05T21:06:25.813
Link: CVE-2025-2611

No data.

Updated: 2025-08-05T20:50:23Z