### [CVE-2015-2842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2842) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Unrestricted file upload vulnerability in go_audiostore.php in the audiostore (Voice Files) upload functionality in GoAutoDial GoAdmin CE 3.x before 3.3-1421902800 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in sounds/. ### POC #### Reference - http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html - https://www.exploit-db.com/exploits/36807/ #### Github - https://github.com/TarunYenni/GoAutoDial-CE-3.3-Exploit-Authentication-Bypass-Command-Injection