Authenticated OS Command Execution Vulnerability in Gargoyle Router Management Utility
CVE-2015-10145
Key Information:
- Vendor
Gargoyle
- Vendor
- CVE Published:
- 31 December 2025
Badges
What is CVE-2015-10145?
The Gargoyle router management utility versions 1.5.x contains an authenticated OS command execution vulnerability. The flaw resides in the /utility/run_commands.sh script, where the application does not properly validate or restrict inputs supplied via the 'commands' parameter. This oversight allows authenticated attackers to execute arbitrary shell commands on the device's underlying system. If exploited, this vulnerability can lead to complete system compromise, including unauthorized access to sensitive files and execution of malicious commands controlled by the attacker.
Affected Version(s)
Gargoyle Router Management Utility 1.5.x
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
