Security for everyone

CVE-2014-1203 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in Eyou Mail System affects v. before 3.6.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



Eyou Mail System is a widely used email platform that enables users to manage and organize their emails efficiently. It is popular among businesses that require a reliable email service for their operations. The platform offers a range of features, including email management tools, task scheduling, and collaboration functionalities, making it a reliable and powerful tool for email communication.

However, the platform has been exposed to a significant vulnerability in the past, known as CVE-2014-1203. This security flaw enabled remote attackers to execute arbitrary commands using shell metacharacters in the domain parameter to admin/domain/ip_login_set/d_ip_login_get.php. The vulnerability was a result of poor input validation and a lack of proper sanitization of user input data, allowing attackers to inject malicious code into the system and gain unauthorized access.

This vulnerability could lead to serious consequences, such as data breaches, exposure of sensitive information, and unauthorized access to critical systems. Exploiting this flaw could give attackers complete control over the email system, allowing them to launch attacks on other systems, steal confidential data, and disrupt business operations.

In conclusion, the security of digital assets is crucial, and it is imperative to take measures to protect against vulnerabilities such as CVE-2014-1203. With the pro features of the platform, users can stay informed about the current state of their digital assets and take proactive measures to secure them against attacks. The platform provides a comprehensive and robust solution for detecting and remedying vulnerabilities before they can be exploited, ensuring the defense of digital assets.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture