In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.
{
"cpe": "cpe:2.3:a:mtproto:mt_proto_proxy:*:*:*:*:*:erlang:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "0.7.2"
}
]
}