CVE-2008-2649

DesktopOnNet 3 Beta - Remote Code Execution via app_path Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2649. PoCs published by MK.

AI-analyzed exploit summary This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in DesktopOnNet 3 Beta by manipulating the 'app_path' parameter to include arbitrary remote files. The PoC provides URLs that can be used to execute malicious scripts by injecting a shell path.

Description

Multiple PHP remote file inclusion vulnerabilities in DesktopOnNet 3 Beta allow remote attackers to execute arbitrary PHP code via a URL in the app_path parameter to (1) don3_requiem.don3app/don3_requiem.php and (2) frontpage.don3app/frontpage.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by MK · textwebappsphp
https://www.exploit-db.com/exploits/5715

This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in DesktopOnNet 3 Beta by manipulating the 'app_path' parameter to include arbitrary remote files. The PoC provides URLs that can be used to execute malicious scripts by injecting a shell path.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: DesktopOnNet 3 Beta
No auth needed
Prerequisites: Network access to the target application · PHP remote file inclusion enabled on the server
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (2)

Core 2
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5715
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42790

Scores

EPSS 0.0362
EPSS Percentile 87.9%

Details

CWE
CWE-94
Status published
Products (1)
don3/desktoponnet 3 beta
Published Jun 10, 2008
Tracked Since Feb 18, 2026