CVE-2019-11224

HIGH

HARMAN AMX MVP5150 v2.87.13 - OS Command Injection

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2019-11224. PoCs published by Insecurities.

AI-analyzed exploit summary This repository contains a functional exploit for CVE-2019-11224, targeting Modero AMX devices. The exploit leverages command injection via the 'ping' function through Telnet, allowing remote code execution by remounting the filesystem and downloading/executing a reverse shell payload.

Description

HARMAN AMX MVP5150 v2.87.13 devices allow remote OS Command Injection.

Exploits (1)

nomisec WORKING POC
by Insecurities · poc
https://github.com/Insecurities/CVE-2019-11224

This repository contains a functional exploit for CVE-2019-11224, targeting Modero AMX devices. The exploit leverages command injection via the 'ping' function through Telnet, allowing remote code execution by remounting the filesystem and downloading/executing a reverse shell payload.

Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target: Modero AMX devices (versions prior to 2.87.13)
No auth needed
Prerequisites: Telnet access to the target device · HTTP server to host the reverse shell payload
devstral-2 · analyzed Feb 19, 2026 Full analysis →

Scores

CVSS v3 8.8
EPSS 0.2682
EPSS Percentile 96.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
harman/amx_mvp5150_firmware 2.87.13
Published May 15, 2019
Tracked Since Feb 18, 2026