CVE-2016-15048

9.8 CRITICAL
Published: October 22, 2025 Modified: December 31, 2025

Description

AMTT Hotel Broadband Operation System (HiBOS) contains an unauthenticated command injection vulnerability in the /manager/radius/server_ping.php endpoint. The application constructs a shell command that includes the user-supplied ip parameter and executes it without proper validation or escaping. An attacker can insert shell metacharacters into the ip parameter to inject and execute arbitrary system commands as the web server user. The initial third-party disclosure in 2016 recommended contacting the vendor for remediation guidance. Additionally, this product may have been rebranded under a different name. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-14 at 04:45:53.510819 UTC.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://wooyun.laolisafe.com/bug_detail.php?wybug_id=wooyun-2016-0181444
Source: disclosure@vulncheck.com
Issue Tracking Exploit Third Party Advisory
https://www.amttgroup.com/
Source: disclosure@vulncheck.com
Product
https://www.cnvd.org.cn/flaw/show/CNVD-2021-37784
Source: disclosure@vulncheck.com
Issue Tracking

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.7%
72th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

amttgroup