### [CVE-2017-4053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4053) ![](https://img.shields.io/static/v1?label=Product&message=Advanced%20Threat%20Defense%20(ATD)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.10%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection%20vulnerability&color=brightgreen) ### Description Command Injection vulnerability in the web interface in McAfee Advanced Threat Defense (ATD) 3.10, 3.8, 3.6, 3.4 allows remote unauthenticated users / remote attackers to execute a command of their choice via a crafted HTTP request parameter. ### POC #### Reference - https://kc.mcafee.com/corporate/index?page=content&id=SB10204 #### Github No PoCs found on GitHub currently.