CVE-2009-0545
EXPLOITED NUCLEIZeroShell <1.0beta11 - Command Injection
Title source: llmDescription
cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by ikki · textremotehardware
https://www.exploit-db.com/exploits/8023
metasploit
WORKING POC
EXCELLENT
by Yann CAM · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/zeroshell_exec.rb
Nuclei Templates (1)
ZeroShell <= 1.0beta11 Remote Code Execution
CRITICALby geeknik
Shodan:
http.title:"zeroshell"
FOFA:
title="zeroshell"
References (6)
Scores
EPSS
0.9401
EPSS Percentile
99.9%
Exploitation Intel
VulnCheck KEV
2019-06-13
Classification
CWE
CWE-20
Status
draft
Affected Products (11)
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
Timeline
Published
Feb 12, 2009
Tracked Since
Feb 18, 2026