Vulnerabilities
Vulnerable Software
Clash Project:  >> Clash  Security Vulnerabilities
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
CVSS Score
9.8
EPSS Score
0.008
Published
2023-02-23
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
CVSS Score
7.8
EPSS Score
0.001
Published
2022-09-29
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
CVSS Score
9.8
EPSS Score
0.011
Published
2022-03-28
In Dreamacro Clash for Windows v0.11.4, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed (using a tool like responder) for code execution (or captured for hash cracking).
CVSS Score
8.8
EPSS Score
0.001
Published
2022-03-21


Contact Us

Shodan ® - All rights reserved