CVE-2016-15048
CRITICAL EXPLOITEDAMTT Hotel Broadband Operation System - Command Injection
Title source: llmDescription
AMTT Hotel Broadband Operation System (HiBOS) contains an unauthenticated command injection vulnerability in the /manager/radius/server_ping.php endpoint. The application constructs a shell command that includes the user-supplied ip parameter and executes it without proper validation or escaping. An attacker can insert shell metacharacters into the ip parameter to inject and execute arbitrary system commands as the web server user. The initial third-party disclosure in 2016 recommended contacting the vendor for remediation guidance. Additionally, this product may have been rebranded under a different name. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-14 at 04:45:53.510819 UTC.
References (5)
Core 5
Core References
Issue Tracking, Exploit, Third Party Advisory third-party-advisory
patch
https://wooyun.laolisafe.com/bug_detail.php?wybug_id=wooyun-2016-0181444
Issue Tracking vdb-entry
https://www.cnvd.org.cn/flaw/show/CNVD-2021-37784
Product exploit
https://github.com/adysec/nuclei_poc/blob/49c283b2bbb244c071786a2b768fbdde1b91f38e/poc/remote_code_execution/hiboss-rce_2.yaml#L21
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/amtt-hibos-command-injection-rce-via-server-ping-php
Product product
https://www.amttgroup.com/
Scores
CVSS v3
9.8
EPSS
0.0113
EPSS Percentile
78.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
VulnCheck KEV
2025-10-22
CWE
CWE-78
Status
published
Products (1)
amttgroup/hibos
Published
Oct 22, 2025
Tracked Since
Feb 18, 2026