### [CVE-2019-5164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5164) ![](https://img.shields.io/static/v1?label=Product&message=Shadowsocks&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen) ### Description An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 #### Github - https://github.com/ARPSyndicate/cvemon