The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling.
Versions 7.4 and below are known to be vulnerable.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/rapid7/metasploit-framework/pull/20446 |
![]() ![]() |
History
Wed, 06 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ict Innovations
Ict Innovations ictbroadcast |
|
Vendors & Products |
Ict Innovations
Ict Innovations ictbroadcast |
Tue, 05 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling. Versions 7.4 and below are known to be vulnerable. | |
Title | ICTBroadcast Unauthenticated Session Cookie Remote Code Execution | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-05T15:00:32.531Z
Updated: 2025-08-06T16:13:05.773Z
Reserved: 2025-03-21T14:48:20.392Z
Link: CVE-2025-2611

Updated: 2025-08-05T15:06:08.142Z

Status : Awaiting Analysis
Published: 2025-08-05T15:15:29.127
Modified: 2025-08-05T21:06:25.813
Link: CVE-2025-2611

No data.