Remote Code Execution Vulnerability in GOM Player by GOM Lab
CVE-2023-53875

7.5HIGH

Key Information:

Vendor

Gomlab

Vendor
CVE Published:
15 December 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2023-53875?

GOM Player version 2.3.90.5360 is susceptible to a remote code execution vulnerability stemming from its Internet Explorer component. This flaw facilitates attackers to execute arbitrary code through DNS spoofing techniques. By exploiting a malicious URL shortcut combined with WebDAV, attackers can redirect users to execute a reverse shell, enabling interaction with a remote SMB server. This vulnerability poses significant risks to users by allowing potential arbitrary code execution without user consent.

Affected Version(s)

GOM Player 2.3.90.5360

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

M. Akil Gündoğan
.
CVE-2023-53875 : Remote Code Execution Vulnerability in GOM Player by GOM Lab