VYPR
Unrated severityNVD Advisory· Published Oct 19, 2015· Updated May 6, 2026

CVE-2015-7860

CVE-2015-7860

Description

Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stack-based buffer overflow in HP/Radia Client Automation agent allows unauthenticated remote code execution as SYSTEM.

Vulnerability

A stack-based buffer overflow exists in the agent component of Hewlett-Packard Client Automation (now Persistent Accelerite Radia Client Automation) prior to version 9.1. The flaw is triggered when the agent receives a large buffer of data over the network. No authentication is required to reach the vulnerable code path [1][2].

Exploitation

An unauthenticated remote attacker can send a specially crafted, oversized buffer to the agent. The agent fails to properly validate the size of the incoming data, causing a stack buffer overflow. This can be achieved without any prior access or user interaction, provided the target environment does not employ relationship-based firewalling that would block the network traffic [1][2].

Impact

Successful exploitation allows an attacker to execute arbitrary code with SYSTEM privileges, resulting in complete compromise of the affected system. The attacker gains full control over confidentiality, integrity, and availability of the host [1][2].

Mitigation

Persistent Accelerite released a hotfix for this issue; the vulnerability is fixed in Radia Client Automation version 9.1 and later. Organizations should update to the latest version. If patching is not immediately possible, network-level access controls (e.g., firewalls) should be applied to restrict traffic to the agent port from untrusted sources [2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

5
  • cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*
    • cpe:2.3:a:accelerite:radia_client_automation:8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:accelerite:radia_client_automation:9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:accelerite:radia_client_automation:9.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.