CVE-2010-0983

rezervi < 3.0.2 - Remote Code Execution via mail.inc.php root Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2010-0983. PoCs published by r00t.h4x0r.

AI-analyzed exploit summary This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in Rezervi <= 3.0.2 via the 'root' parameter in mail.inc.php. The PoC allows an attacker to include and execute arbitrary remote shell code.

Description

PHP remote file inclusion vulnerability in include/mail.inc.php in Rezervi 3.0.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the root parameter, a different vector than CVE-2007-2156.

Exploits (1)

exploitdb WORKING POC VERIFIED
by r00t.h4x0r · textwebappsphp
https://www.exploit-db.com/exploits/10967

This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in Rezervi <= 3.0.2 via the 'root' parameter in mail.inc.php. The PoC allows an attacker to include and execute arbitrary remote shell code.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: Rezervi <= 3.0.2
No auth needed
Prerequisites: Remote shell accessible via URL · PHP allow_url_include enabled
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/55341
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/37589
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/10967
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0016
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38118
Exploit vdb-entry x_refsource_osvdb
http://osvdb.org/61450

Scores

EPSS 0.0425
EPSS Percentile 88.9%

Details

CWE
CWE-94
Status published
Products (1)
utilo/rezervi < 3.0.2
Published Mar 16, 2010
Tracked Since Feb 18, 2026