| 제목 | BeamCtrl Airiana 11.0 Insecure Deserialization |
|---|
| 설명 | The coef script within the BeamCtrl/Airiana repository is vulnerable to insecure deserialization, leading to remote code execution (RCE). The script loads data from coeficients.dat using Python's pickle.load() without validating the contents, allowing an attacker to execute arbitrary code by replacing the .dat file with a malicious payload |
|---|
| 원천 | ⚠️ https://github.com/BeamCtrl/Airiana/issues/42 |
|---|
| 사용자 | hacker_rootki (UID 84361) |
|---|
| 제출 | 2025. 05. 04. AM 09:30 (12 개월 ago) |
|---|
| 모더레이션 | 2025. 05. 15. AM 09:59 (11 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 309040 [BeamCtrl Airiana 까지 11.0 coef 권한 상승] |
|---|
| 포인트들 | 19 |
|---|