### [CVE-2021-44750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44750) ![](https://img.shields.io/static/v1?label=Product&message=F-Secure%20Elements%20Agent%2C%20F-Secure%20MDR%2C%20F-Secure%20Client%20Security%2C%20F-Secure%20Server%20Security%2C%20F-Secure%20Email%20and%20Server%20Security%2C%20F-Secure%20Freedome%20VPN%2C%20F-Secure%20SAFE%2C%20F-Secure%20KEY%2C%20and%20F-Secure%20Internet%20Security%20%2F%20Anti-Virus&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=All%20Version%20%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20Code%20Execution&color=brightgreen) ### Description An arbitrary code execution vulnerability was found in the F-Secure Support Tool. A standard user can craft a special configuration file, which when run by administrator can execute any commands. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/nasbench/nasbench