Impact
A flaw in FileZen’s antivirus check option permits an authenticated, logged‑in user to send a crafted HTTP request that is interpreted as an OS command, enabling arbitrary command execution on the host. The vulnerability is an OS command injection, classified as CWE‑78, and can compromise confidentiality, integrity, and availability by allowing an attacker to run any command with the privileges of the FileZen service.
Affected Systems
The affected product is Soliton Systems FileZen. No specific version information was supplied.
Risk and Exploitability
The flaw carries a CVSS score of 8.7 and an EPSS score of 8 %, indicating a high likelihood of exploitation. It is listed in CISA’s Known Exploited Vulnerabilities catalog, confirming active or recent exploitation. Attackers must be authenticated and exploit the enabled antivirus check option; once they do, they can execute any OS command on the underlying system.
OpenCVE Enrichment