CVE-2015-1497

Persistent Systems Radia Client Automation <9.1 - RCE

Title source: llm

Description

radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/36169
exploitdb WORKING POC
by SlidingWindow · pythonremotemultiple
https://www.exploit-db.com/exploits/40491
exploitdb WORKING POC
by Ben Turner · rubyremotewindows
https://www.exploit-db.com/exploits/36206
metasploit WORKING POC GREAT
by Ben Turner, juan vazquez · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/persistent_hpca_radexec_exec.rb

Scores

EPSS 0.8825
EPSS Percentile 99.5%

Details

CWE
CWE-94
Status published
Products (4)
persistent_systems/radia_client_automation 7.9
persistent_systems/radia_client_automation 8.1
persistent_systems/radia_client_automation 9.0
persistent_systems/radia_client_automation 9.1
Published Feb 16, 2015
Tracked Since Feb 18, 2026