### [CVE-2018-12483](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12483) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description OCS Inventory 2.4.1 is prone to a remote command-execution vulnerability. Specifically, this issue occurs because the content of the ipdiscover_analyser rzo GET parameter is concatenated to a string used in an exec() call in the PHP code. Authentication is needed in order to exploit this vulnerability. ### POC #### Reference - https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/ #### Github No PoCs found on GitHub currently.