Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Spotify partners with record labels to develop ‘artist-first’ AI music products

How time crystals could power advanced quantum computers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access
Identity

Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access

userBy userOctober 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 15, 2025Ravi LakshmananVulnerabilities / Server Security

remote shell access

Cybersecurity researchers have revealed that a critical security flaw affecting ICT Innovations’ autodialer software, ICTBroadcast, is being exploited in the wild.

The vulnerability, assigned CVE identifier CVE-2025-2611 (CVSS score: 9.3), is related to improper input validation when the call center application does not securely pass session cookie data to shell processing, which could lead to unauthenticated remote code execution.

This allows an attacker to inject shell commands into session cookies running on the vulnerable server. This security flaw affects ICTBroadcast versions 7.4 and below.

DFIR retainer service

“An attacker is leveraging unauthenticated command injection on ICTBroadcast via the BROADCAST cookie to remotely execute code,” VulnCheck’s Jacob Baines said in a Tuesday alert. “There are approximately 200 online instances published.”

The cybersecurity company announced on October 11th that it had detected a live exploit. The attack occurred in two stages, starting with a time-based exploit check, followed by an attempt to set up a reverse shell.

To do so, an unknown attacker has been observed injecting a Base64-encoded command that translates to “sleep3” into the BROADCAST cookie of a specially crafted HTTP request to confirm command execution and create a reverse shell.

“The attacker used a local protocol[.]net URL in the mkfifo + nc payload, and also established a connection to 143.47.53[.]For other payloads, there are 106,” Baines noted.

CIS build kit

It is worth noting that both the use of the localto.net link and the IP address were previously reported by Fortinet in connection with an email campaign targeting organizations in Spain, Italy, and Portugal to distribute a Java-based remote access Trojan (RAT) named Ratty RAT.

VulnCheck noted that the overlap in these metrics suggests the possibility of reusing or sharing tools. At this time, there is no information regarding the patch status for this flaw. Hacker News has reached out to ICT Innovations for further comment. I will update the article if I receive a response.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI will take 5 years to turn $13 billion into $1 trillion
Next Article Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control
user
  • Website

Related Posts

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

October 16, 2025

How to Assess and Choose the Right AI-SOC Platform

October 16, 2025

Hackers deploy Linux rootkits via Cisco SNMP flaw in ‘Zero Disco’ attack

October 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Spotify partners with record labels to develop ‘artist-first’ AI music products

How time crystals could power advanced quantum computers

How to Assess and Choose the Right AI-SOC Platform

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.