- 
                Notifications
    You must be signed in to change notification settings 
- Fork 1.6k
Open
Description
https://github.com/Tritium0041/Jrohy-trojan-RCE-POC
There is a critical command injection (Remote Code Execution, RCE) vulnerability in the /trojan/log endpoint of the jrohy-trojan web interface. The issue arises because user input from the line query parameter is concatenated directly into a shell command without proper sanitization. As a result, remote attackers can inject arbitrary shell commands, leading to full command execution on the server with the privileges of the web service. This allows attackers to compromise the server, steal sensitive data, or further escalate their attack. No authentication is required for exploitation due to CVE-2024-55215, making the vulnerability even more dangerous.
Metadata
Metadata
Assignees
Labels
No labels