GOM Player 2.3.90.5360 contains a remote code execution vulnerability in its Internet Explorer component that allows attackers to execute arbitrary code through DNS spoofing. Attackers can redirect victims using a malicious URL shortcut and WebDAV technique to run a reverse shell with SMB server interaction.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51719 | Exploit Third Party Advisory VDB Entry |
| https://www.gomlab.com/ | Product |
| https://www.vulncheck.com/advisories/gom-player-remote-code-execution-via-insecure-ie-component | Third Party Advisory |
| https://www.exploit-db.com/exploits/51719 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-15 21:15
Updated : 2025-12-18 22:35
NVD link : CVE-2023-53875
Mitre link : CVE-2023-53875
CVE.ORG link : CVE-2023-53875
JSON object : View
Products Affected
gomlab
- gom_player
CWE
CWE-319
Cleartext Transmission of Sensitive Information
