### [CVE-2018-1000881](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000881) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Traccar Traccar Server version 4.0 and earlier contains a CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability in ComputedAttributesHandler.java that can result in Remote Command Execution. This attack appear to be exploitable via Remote: web application request by a self-registered user. This vulnerability appears to have been fixed in 4.1 and later. ### POC #### Reference - https://appcheck-ng.com/advisory-remote-code-execution-traccar-server/ #### Github No PoCs found on GitHub currently.