fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution).
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://fex.rus.uni-stuttgart.de | product vendor advisory |
https://secfault-security.com/advisories/cve2020-15591.html | exploit third party advisory patch |
https://cwe.mitre.org/data/definitions/95.html | third party advisory |