ZoneMinder Language Settings Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 6 May 2022.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits an arbitrary file write in the debug log file option chained with a path traversal in the language settings that leads to remote code execution in ZoneMinder surveillance software versions before 1.36.13 and before 1.37.11

    Continue reading...
     

Share This Page

Loading...