exploit the possibilities

VisualWare MyConnection Server 11.x Remote Code Execution

VisualWare MyConnection Server 11.x Remote Code Execution
Posted Feb 26, 2021
Authored by Ryan Wincey | Site securifera.com

VisualWare MyConnection Server version 11.x suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2021-27198
MD5 | cf188679c13163fa44bbfe617632fcd1

VisualWare MyConnection Server 11.x Remote Code Execution

Change Mirror Download
Document Title:


VisualWare MyConnection Server 11.x Remote Code Execution Vulnerability

References (Source):




Release Date:



Product & Service Introduction:


MCS tests, measures & reports the performance and health of any network
connection, LAN or WAN. MCS is an access everywhere web based enterprise

Vulnerability Information:


Class: CWE-434: Unrestricted Upload of File with Dangerous Type

Impact: Remote Code Execution

Remotely Exploitable: Yes

Locally Exploitable: Yes

CVE Name: CVE-2021-27198

Vulnerability Description:


An unauthenticated remote code execution vulnerability was discovered in
Visualware MyConnection Server 11.0 through 11.0b build 5382. The web
endpoint at "https://example.com/myspeed/sf" provides an unauthenticated
user the ability to upload an arbitrary file to an arbitrary location via a
specially crafted POST request. This application is written in Java and is
thus cross-platform. The Windows installation executes the web server as
SYSTEM which means that exploitation provides Administrator privileges on
the target system.

Vulnerability Disclosure Timeline:


2021-01-11: Contacted VisualWare About Issue via Website Contact Form

2021-02-03: Emailed Multiple VisualWare POCs Requesting Disclosure

2021-02-11: Requested CVE from MITRE for vulnerability

2021-02-12: Messaged Lead VisualWare Developer on LinkedIn After Seeing They
Had Looked At My Profile. I assume because of my attempts to contact them

2021-02-18: Notified VisualWare About Issue Again via Website Contact Form
And Notified Them I Would be Disclosing if they did not respond

2021-02-25: Publicly releasing vulnerability because company refuses to
respond to any attempts to coordinate disclsoure

Affected Product(s):


VisualWare MyConnection Server 11.0 through 11.0b build 5382

Severity Level:



Proof of Concept (PoC):


A proof of concept will not be provided at this time.

Solution - Fix & Patch:



Security Risk:


The security risk of this remote code execution vulnerability is estimated
as high. (CVSS 10.0)

Credits & Authors:


Securifera, Inc - b0yd (@rwincey)

Disclaimer & Information:


The information provided in this advisory is provided as it is without any
warranty. Securifera disclaims all

warranties, either expressed or implied,

including the warranties of merchantability and capability for a particular
purpose. Securifera is not liable in any

case of damage,

including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Securifera

or its suppliers have been advised

of the possibility of such damages. Some states do not allow the exclusion
or limitation of liability for consequential

or incidental damages so the foregoing

limitation may not apply. We do not approve or encourage anybody to break
any licenses, policies, or hack into any


Domains: www.securifera.com

Contact: contact [at] securifera [dot] com

Social: twitter.com/securifera

Copyright C 2021 | Securifera, Inc

Login or Register to add favorites

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    26 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    2 Files
  • 9
    May 9th
    2 Files
  • 10
    May 10th
    13 Files
  • 11
    May 11th
    17 Files
  • 12
    May 12th
    22 Files
  • 13
    May 13th
    11 Files
  • 14
    May 14th
    9 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By