Exploitation Summary
EIP tracks 1 public exploit for CVE-2007-6182. PoCs published by Andrew Christensen.
AI-analyzed exploit summary This exploit leverages a local privilege escalation vulnerability in ISPmanager by injecting shell commands into the responder binary's arguments, leading to arbitrary command execution with elevated privileges.
Description
The responder program in ISPsystem ISPmanager (aka ISPmgr) 4.2.15.1 allows local users to gain privileges via shell metacharacters in command line arguments.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Andrew Christensen · textlocallinux
https://www.exploit-db.com/exploits/30780
This exploit leverages a local privilege escalation vulnerability in ISPmanager by injecting shell commands into the responder binary's arguments, leading to arbitrary command execution with elevated privileges.
Classification
Working Poc 90%
Attack Type
Lpe
Complexity
Trivial
Reliability
Reliable
Target:
ISPmanager 4.2.15.1
No auth needed
Prerequisites:
Local access to the affected system
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (6)
Core 6
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/27585
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26503
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/42337
Exploit x_refsource_misc
http://www.fortconsult.net/images/pdf/advisories/ispmgr_nov2007.pdf
Various Sources x_refsource_misc
http://ispsystem.com/en/support/changelog/ispmgr.html?all=yes
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38564
Scores
EPSS
0.0041
EPSS Percentile
61.3%
Details
CWE
CWE-264
Status
published
Products (1)
growth/ispmanager
< 4.0
Published
Nov 30, 2007
Tracked Since
Feb 18, 2026