CVE-2012-10040
CRITICALOpenfiler v2.x - Command Injection
Title source: llmDescription
Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/21191
metasploit
WORKING POC
EXCELLENT
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/openfiler_networkcard_exec.rb
References (5)
Scores
CVSS v4
9.4
EPSS
0.5627
EPSS Percentile
98.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (2)
Openfiler/Openfiler
2.0
Openfiler/Openfiler
2.x
Published
Aug 11, 2025
Tracked Since
Feb 18, 2026