vendor:
Xunlei XPPlayer
by:
superli
9,3
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Xunlei XPPlayer
Affected Version From: <= 5.9.14.1246
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:xunlei:xunlei_xpplayer
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3, IE6
2009
Xunlei XPPlayer ActiveX Remote Exec 0day POC
This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Xunlei XPPlayer ActiveX. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Xunlei XPPlayer ActiveX control, which listens by default on TCP port 8888. By sending a specially crafted packet to this port, an attacker can gain arbitrary code execution under the context of the user.
Mitigation:
Upgrade to version 5.9.14.1246 or later.