Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.
References
Configurations
No configuration.
History
14 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/a-rey/exploits/blob/main/writeups/Inbit_Messenger/v4.6.0/writeup.md - |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-01-14 20:16
NVD link : CVE-2023-54329
Mitre link : CVE-2023-54329
CVE.ORG link : CVE-2023-54329
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow
