CVE-2014-6287

CRITICAL KEV NUCLEI

Rejetto HTTP File Server <2.3c - RCE

Title source: llm

Description

The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.

Exploits (22)

exploitdb WORKING POC VERIFIED
by Avinash Thapa · pythonremotewindows
https://www.exploit-db.com/exploits/39161
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/34926
exploitdb WORKING POC VERIFIED
by Daniele Linguaglossa · textremotewindows
https://www.exploit-db.com/exploits/34668
exploitdb WORKING POC
by Óscar Andreu · pythonwebappswindows
https://www.exploit-db.com/exploits/49125
nomisec WORKING POC 2 stars
by randallbanner · remote
https://github.com/randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution
nomisec WORKING POC 1 stars
by hadrian3689 · remote
https://github.com/hadrian3689/rejetto_hfs_rce
nomisec WORKING POC 1 stars
by mrintern · remote
https://github.com/mrintern/thm_steelmountain_CVE-2014-6287
nomisec NO CODE 1 stars
by Nicoslo · poc
https://github.com/Nicoslo/Windows-exploitation-Rejetto-HTTP-File-Server-HFS-2.3.x-CVE-2014-6287
nomisec WRITEUP
by R3fr4kt · poc
https://github.com/R3fr4kt/Optimum
nomisec WORKING POC
by jagg3rsec · remote
https://github.com/jagg3rsec/CVE-2014-6287
nomisec WORKING POC
by JoaZ94 · remote
https://github.com/JoaZ94/rejjeto_hfs-rce-exploit-cve-2014-6287
nomisec WORKING POC
by nika0x38 · remote
https://github.com/nika0x38/CVE-2014-6287
nomisec WORKING POC
by rahisec · remote
https://github.com/rahisec/rejetto-http-file-server-2.3.x-RCE-exploit-CVE-2014-6287
nomisec WORKING POC
by Z3R0space · poc
https://github.com/Z3R0space/CVE-2014-6287
nomisec WORKING POC
by Z3R0-0x30 · remote
https://github.com/Z3R0-0x30/CVE-2014-6287
nomisec WORKING POC
by francescobrina · remote
https://github.com/francescobrina/hfs-cve-2014-6287-exploit
github WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/cve-2014-6287
nomisec WORKING POC
by zhsh9 · remote
https://github.com/zhsh9/CVE-2014-6287
nomisec WORKING POC
by 10cks · remote
https://github.com/10cks/CVE-2014-6287
nomisec WORKING POC
by roughiz · remote
https://github.com/roughiz/cve-2014-6287.py
nomisec WORKING POC
by wizardy0ga · remote
https://github.com/wizardy0ga/THM-Steel_Mountain-CVE-2014-6287
metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/rejetto_hfs_exec.rb

Nuclei Templates (1)

HTTP File Server <2.3c - Remote Command Execution
CRITICALVERIFIEDby j4vaovo
Shodan: http.favicon.hash:2124459909
FOFA: icon_hash=2124459909

Scores

CVSS v3 9.8
EPSS 0.9436
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-25
VulnCheck KEV 2019-06-03
InTheWild.io 2022-03-25
ENISA EUVD EUVD-2014-6172
CWE
CWE-94
Status published
Products (1)
rejetto/http_file_server 2.3 - 2.3c
Published Oct 07, 2014
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026