{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2016-15048","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-10-21T15:54:39.430Z","datePublished":"2025-10-22T14:21:01.096Z","dateUpdated":"2025-10-22T14:34:46.683Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","modules":["/manager/radius/server_ping.php"],"product":"Hotel Broadband Operation System (HiBOS)","vendor":"Anmei Century (Beijing) Technology Co., Ltd.","versions":[{"status":"affected","version":"0"}]}],"credits":[{"lang":"en","type":"finder","value":"YY-2012"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"AMTT Hotel Broadband Operation System (HiBOS) contains an unauthenticated command injection vulnerability in the /manager/radius/server_ping.php endpoint. The application constructs a shell command that includes the user-supplied ip parameter and executes it without proper validation or escaping. An attacker can insert shell metacharacters into the ip parameter to inject and execute arbitrary system commands as the web server user. The initial third-party disclosure in 2016 recommended contacting the vendor for remediation guidance. Additionally, this product may have been rebranded under a different name.&nbsp;VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-14&nbsp;at 04:45:53.510819 UTC.<br>"}],"value":"AMTT Hotel Broadband Operation System (HiBOS) contains an unauthenticated command injection vulnerability in the /manager/radius/server_ping.php endpoint. The application constructs a shell command that includes the user-supplied ip parameter and executes it without proper validation or escaping. An attacker can insert shell metacharacters into the ip parameter to inject and execute arbitrary system commands as the web server user. The initial third-party disclosure in 2016 recommended contacting the vendor for remediation guidance. Additionally, this product may have been rebranded under a different name. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-14 at 04:45:53.510819 UTC."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":10,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2025-10-22T14:21:01.096Z"},"references":[{"tags":["product"],"url":"https://www.amttgroup.com/"},{"tags":["third-party-advisory","patch"],"url":"https://wooyun.laolisafe.com/bug_detail.php?wybug_id=wooyun-2016-0181444"},{"tags":["vdb-entry"],"url":"https://www.cnvd.org.cn/flaw/show/CNVD-2021-37784"},{"tags":["exploit"],"url":"https://github.com/adysec/nuclei_poc/blob/49c283b2bbb244c071786a2b768fbdde1b91f38e/poc/remote_code_execution/hiboss-rce_2.yaml#L21"},{"tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/amtt-hibos-command-injection-rce-via-server-ping-php"}],"source":{"discovery":"UNKNOWN"},"tags":["x_known-exploited-vulnerability"],"title":"AMTT HiBOS Command Injection RCE via server_ping.php","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-22T14:34:26.525541Z","id":"CVE-2016-15048","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-22T14:34:46.683Z"}}]}}