High severity8.8NVD Advisory· Published Jan 30, 2017· Updated May 13, 2026
CVE-2016-6266
CVE-2016-6266
Description
ccca_ajaxhandler.php in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) host or (2) apikey parameter in a register action, (3) enable parameter in a save_stting action, or (4) host or (5) apikey parameter in a test_connection action.
Affected products
3cpe:2.3:a:trendmicro:smart_protection_server:2.5:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:trendmicro:smart_protection_server:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:smart_protection_server:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:smart_protection_server:3.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- success.trendmicro.com/solution/1114913nvdMitigationPatchVendor Advisory
- qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/nvdExploitTechnical DescriptionThird Party Advisory
News mentions
0No linked articles in our index yet.