Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

India changes deep tech startup rules

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access
Identity

Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access

userBy userOctober 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 15, 2025Ravi LakshmananVulnerabilities / Server Security

remote shell access

Cybersecurity researchers have revealed that a critical security flaw affecting ICT Innovations’ autodialer software, ICTBroadcast, is being exploited in the wild.

The vulnerability, assigned CVE identifier CVE-2025-2611 (CVSS score: 9.3), is related to improper input validation when the call center application does not securely pass session cookie data to shell processing, which could lead to unauthenticated remote code execution.

This allows an attacker to inject shell commands into session cookies running on the vulnerable server. This security flaw affects ICTBroadcast versions 7.4 and below.

DFIR retainer service

“An attacker is leveraging unauthenticated command injection on ICTBroadcast via the BROADCAST cookie to remotely execute code,” VulnCheck’s Jacob Baines said in a Tuesday alert. “There are approximately 200 online instances published.”

The cybersecurity company announced on October 11th that it had detected a live exploit. The attack occurred in two stages, starting with a time-based exploit check, followed by an attempt to set up a reverse shell.

To do so, an unknown attacker has been observed injecting a Base64-encoded command that translates to “sleep3” into the BROADCAST cookie of a specially crafted HTTP request to confirm command execution and create a reverse shell.

“The attacker used a local protocol[.]net URL in the mkfifo + nc payload, and also established a connection to 143.47.53[.]For other payloads, there are 106,” Baines noted.

CIS build kit

It is worth noting that both the use of the localto.net link and the IP address were previously reported by Fortinet in connection with an email campaign targeting organizations in Spain, Italy, and Portugal to distribute a Java-based remote access Trojan (RAT) named Ratty RAT.

VulnCheck noted that the overlap in these metrics suggests the possibility of reusing or sharing tools. At this time, there is no information regarding the patch status for this flaw. Hacker News has reached out to ICT Innovations for further comment. I will update the article if I receive a response.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI will take 5 years to turn $13 billion into $1 trillion
Next Article Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

India changes deep tech startup rules

Kids ‘picked last in gym class’ prepare for Super Bowl

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.