Threat Encyclopedia



This indicates an attack attempt to launch a remote command shell.
Attackers may inject shell code or run a malicious script that can bring up a command prompt as a remote console. This provides attackers with complete access to the victim system without any authentication.

Affected Products

Any unprotected Windows or Linux system is vulnerable to the attack.


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Monitor the traffic from that network for any suspicious activity.
Use AntiVirus software to scan and clean the system.