Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 17 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ipcop:ipcop:*:*:*:*:*:*:*:* |
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ipcop
Ipcop ipcop |
|
| Vendors & Products |
Ipcop
Ipcop ipcop |
Fri, 14 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPCop versions up to and including 2.1.9 contain an authenticated remote code execution vulnerability within the web-based administration interface. The email configuration component inserts user-controlled values, including the EMAIL_PW parameter, directly into system-level operations without proper input sanitation. By modifying the email password field to include shell metacharacters and issuing a save-and-test-mail action, an authenticated attacker can execute arbitrary operating system commands with the privileges of the web interface, resulting in full system compromise. | |
| Title | IPCop <= 2.1.9 Authenticated RCE | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:05:27.116Z
Reserved: 2025-11-14T19:25:54.990Z
Link: CVE-2021-4466
Updated: 2025-11-17T20:34:31.776Z
Status : Deferred
Published: 2025-11-14T23:15:42.370
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-4466
No data.
OpenCVE Enrichment
Updated: 2025-11-15T22:07:27Z