HP Client Automation Remote Code Execution Exploit

This module exploits a command injection vulnerability in HP Client Automation. The flaw exists within the radexecd.exe component which listens by default on TCP port 3465. When handling a remote execution request the process does not properly authenticate the user issuing the request. The command to be executed is also not properly sanitized. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of SYSTEM. Authentication is not required to exploit this vulnerability.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Monday, October 26, 2015 - 00:00