CVE-2012-10039
ZEN Load Balancer <3.0-rc1 - Command Injection
Title source: llmDescription
ZEN Load Balancer versions 2.0 and 3.0-rc1 contain a command injection vulnerability in content2-2.cgi. The filelog parameter is passed directly into a backtick-delimited exec() call without sanitation. An authenticated attacker can inject arbitrary shell commands, resulting in remote code execution as the root user. ZEN Load Balancer is the predecessor of ZEVENET and SKUDONET. The affected versions (2.0 and 3.0-rc1) are no longer supported. SKUDONET CE is the current community-maintained successor.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/21849
metasploit
WORKING POC
EXCELLENT
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/zen_load_balancer_exec.rb
References (5)
Scores
EPSS
0.4363
EPSS Percentile
97.5%
Classification
CWE
CWE-78
Status
draft
Timeline
Published
Aug 11, 2025
Tracked Since
Feb 18, 2026