This module exploits a design flaw in HP Data Protector by sending a specially crafted EXEC_SETUP request.
The specific flaw exists within the implementation of the EXEC_SETUP command. This command instructs a Data Protector client to download and execute a setup file. A malicious attacker can instruct the client to access a file off of a share thus executing arbitrary code under the context of the current user.
The specific flaw exists within the implementation of the EXEC_SETUP command. This command instructs a Data Protector client to download and execute a setup file. A malicious attacker can instruct the client to access a file off of a share thus executing arbitrary code under the context of the current user.
CVE Link
Exploit Type - Old
Exploits/Remote
Exploit Platform
Product Name