Description
A path traversal in debug.php accessed via default.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to upload arbitrary files, leading to arbitrary remote code execution.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md
Scores
CVSS v3
8.8
EPSS
0.0343
EPSS Percentile
87.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (2)
blaauwproducts/remote_kiln_control
3.0.0 v4
blaauwproducts/remote_kiln_control
< 3.0.0
Published
May 07, 2020
Tracked Since
Feb 18, 2026