CVE-2007-6182

ISPsystem ISPmanager <4.2.15.1 - Privilege Escalation

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-6182. PoCs published by Andrew Christensen.

AI-analyzed exploit summary This exploit leverages a local privilege escalation vulnerability in ISPmanager by injecting shell commands into the responder binary's arguments, leading to arbitrary command execution with elevated privileges.

Description

The responder program in ISPsystem ISPmanager (aka ISPmgr) 4.2.15.1 allows local users to gain privileges via shell metacharacters in command line arguments.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Andrew Christensen · textlocallinux
https://www.exploit-db.com/exploits/30780

This exploit leverages a local privilege escalation vulnerability in ISPmanager by injecting shell commands into the responder binary's arguments, leading to arbitrary command execution with elevated privileges.

Classification
Working Poc 90%
Attack Type
Lpe
Complexity
Trivial
Reliability
Reliable
Target: ISPmanager 4.2.15.1
No auth needed
Prerequisites: Local access to the affected system
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (6)

Core 6
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27585
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26503
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/42337
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38564

Scores

EPSS 0.0041
EPSS Percentile 61.3%

Details

CWE
CWE-264
Status published
Products (1)
growth/ispmanager < 4.0
Published Nov 30, 2007
Tracked Since Feb 18, 2026