Description

IPCop versions up to and including 2.1.9 contain an authenticated remote code execution vulnerability within the web-based administration interface. The email configuration component inserts user-controlled values, including the EMAIL_PW parameter, directly into system-level operations without proper input sanitation. By modifying the email password field to include shell metacharacters and issuing a save-and-test-mail action, an authenticated attacker can execute arbitrary operating system commands with the privileges of the web interface, resulting in full system compromise.

INFO

Published Date :

2025-11-14T22:52:44.463Z

Last Modified :

2025-11-16T13:10:09.815Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2021-4466 vulnerability.

Vendors Products
Ipcop
  • Ipcop
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2021-4466.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability