CVE-2012-10040
Openfiler v2.x - Command Injection
Title source: llmDescription
Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/21191
metasploit
WORKING POC
EXCELLENT
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/openfiler_networkcard_exec.rb
References (5)
Scores
EPSS
0.5223
EPSS Percentile
97.9%
Classification
CWE
CWE-78
Status
draft
Timeline
Published
Aug 11, 2025
Tracked Since
Feb 18, 2026