Impact
The TinyWeb HTTP Server through version 1.98 contains an OS command injection flaw that allows an unauthenticated attacker to execute arbitrary Windows shell commands. The vulnerability arises when CGI ISINDEX‑style query parameters are passed unfiltered to the CGI executable via CreateProcess(). An attacker can inject shell metacharacters into HTTP requests, causing the server to run unintended commands with the privileges of the service process.
Affected Systems
The affected product is TinyWeb, a Delphi‑based web server for Win32 produced by maximmasiutin. Versions prior to 1.98 are impacted; all releases after 1.98 contain the fix.
Risk and Exploitability
With a CVSS score of 10.0, this flaw represents the highest level of severity. The EPSS score is below 1% and it is not listed in the KEV catalog, indicating a low current exploitation probability in the wild. Nevertheless, because the attack is remote, unauthenticated, and relies only on crafted HTTP requests, the potential impact is catastrophic: a rogue user could gain full control of the host. No special prerequisites beyond HTTP access are required, making the vulnerability highly actionable.
OpenCVE Enrichment