Skip to content
Threat Feed

Vendor

Electerm

4 briefs RSS
critical advisory

Electerm Arbitrary Code Execution via Crafted URI or CLI Arguments

Electerm versions 3.0.6 through 3.8.14 are vulnerable to arbitrary local code execution via crafted electerm:// URIs or command-line arguments, requiring a user to click a malicious link or open a malicious shortcut file.

Electerm code-execution protocol-handler
2r 1t 1c
high advisory

Electerm Remote Code Execution Vulnerability via Malicious Filenames

A remote code execution vulnerability exists in Electerm versions 3.7.8 and earlier, where a malicious SSH server can inject arbitrary commands into a victim's system by crafting filenames with shell metacharacters that are executed when the user attempts to open or edit the file using the 'open with system editor' or 'edit with custom editor' feature.

electerm rce sftp remote code execution
2r 1t 1c
high advisory

Electerm Arbitrary Protocol Execution Vulnerability

Electerm versions 3.8.15 and earlier are vulnerable to arbitrary code execution due to improper validation of URLs, allowing attackers to execute commands by tricking users into clicking malicious links in the terminal.

electerm rce terminal protocol handler
2r 1t 1c
critical advisory

Electerm Path Traversal Vulnerability Leads to Arbitrary Code Execution

Electerm versions prior to 3.7.16 are vulnerable to path traversal, leading to arbitrary code execution through unsanitized widget identifiers.

electerm path-traversal code-execution
2r 2t 1c