Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VSCO expands AI editing capabilities and supports RAW files

How attackers can bypass synced passkeys

Can we hear the “beat” of gravitational waves in a pulsar?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access
Identity

Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access

userBy userOctober 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 15, 2025Ravi LakshmananVulnerabilities / Server Security

remote shell access

Cybersecurity researchers have revealed that a critical security flaw affecting ICT Innovations’ autodialer software, ICTBroadcast, is being exploited in the wild.

The vulnerability, assigned CVE identifier CVE-2025-2611 (CVSS score: 9.3), is related to improper input validation when the call center application does not securely pass session cookie data to shell processing, which could lead to unauthenticated remote code execution.

This allows an attacker to inject shell commands into session cookies running on the vulnerable server. This security flaw affects ICTBroadcast versions 7.4 and below.

DFIR retainer service

“An attacker is leveraging unauthenticated command injection on ICTBroadcast via the BROADCAST cookie to remotely execute code,” VulnCheck’s Jacob Baines said in a Tuesday alert. “There are approximately 200 online instances published.”

The cybersecurity company announced on October 11th that it had detected a live exploit. The attack occurred in two stages, starting with a time-based exploit check, followed by an attempt to set up a reverse shell.

To do so, an unknown attacker has been observed injecting a Base64-encoded command that translates to “sleep3” into the BROADCAST cookie of a specially crafted HTTP request to confirm command execution and create a reverse shell.

“The attacker used a local protocol[.]net URL in the mkfifo + nc payload, and also established a connection to 143.47.53[.]For other payloads, there are 106,” Baines noted.

CIS build kit

It is worth noting that both the use of the localto.net link and the IP address were previously reported by Fortinet in connection with an email campaign targeting organizations in Spain, Italy, and Portugal to distribute a Java-based remote access Trojan (RAT) named Ratty RAT.

VulnCheck noted that the overlap in these metrics suggests the possibility of reusing or sharing tools. At this time, there is no information regarding the patch status for this flaw. Hacker News has reached out to ICT Innovations for further comment. I will update the article if I receive a response.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI will take 5 years to turn $13 billion into $1 trillion
Next Article Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control
user
  • Website

Related Posts

How attackers can bypass synced passkeys

October 15, 2025

Two new Windows zero-days exploited – one affecting all versions shipped to date

October 15, 2025

Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VSCO expands AI editing capabilities and supports RAW files

How attackers can bypass synced passkeys

Can we hear the “beat” of gravitational waves in a pulsar?

Two new Windows zero-days exploited – one affecting all versions shipped to date

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.