CVE-2008-4911

Chattaitaliano Istant-Replay - Remote Code Execution via read.php data Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-4911. PoCs published by THuGM4N.

AI-analyzed exploit summary This exploit demonstrates a remote file inclusion vulnerability in Istant-Replay due to insufficient sanitization of user-supplied data in the 'data' parameter. An attacker can include and execute arbitrary remote files, potentially leading to remote code execution.

Description

PHP remote file inclusion vulnerability in read.php in Chattaitaliano Istant-Replay allows remote attackers to execute arbitrary PHP code via a URL in the data parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by THuGM4N · textwebappsphp
https://www.exploit-db.com/exploits/31655

This exploit demonstrates a remote file inclusion vulnerability in Istant-Replay due to insufficient sanitization of user-supplied data in the 'data' parameter. An attacker can include and execute arbitrary remote files, potentially leading to remote code execution.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: Istant-Replay (version not specified)
No auth needed
Prerequisites: Remote file hosting server · Network access to the vulnerable application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2008-04/0196.html
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28797
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41844

Scores

EPSS 0.0116
EPSS Percentile 78.8%

Details

CWE
CWE-94
Status published
Products (1)
chattaitaliano/istant-replay
Published Nov 04, 2008
Tracked Since Feb 18, 2026