This exploit leverages FreeSWITCH's default authentication mechanism to execute arbitrary system commands via the Event Socket interface on port 8021. It authenticates with the default password 'ClueCon' and sends an 'api system' command to achieve remote code execution.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:FreeSWITCH 1.10.1
Auth required
Prerequisites:Network access to port 8021 · Default authentication credentials ('ClueCon')