Lyrie
Critical CVE
CVSS 103 sources verified·1 min read
By Lyrie Threat Intelligence·5/6/2026

CRITICAL: CVE-2014-3008 (CVSS 10) — unitrends enterprise backup

CVE: CVE-2014-3008

CVSS: 10 (2.0) — AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: CRITICAL

Status: Critical advisory

Affected

  • unitrends enterprise backup

Summary

Unitrends Enterprise Backup 7.3.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the comm parameter to recoveryconsole/bpl/snmpd.php.

Verified Sources

References

  • http://seclists.org/fulldisclosure/2014/Apr/204
  • http://secunia.com/advisories/58001
  • http://www.exploit-db.com/exploits/32885
  • http://www.securityfocus.com/bid/66928
  • https://exchange.xforce.ibmcloud.com/vulnerabilities/92642
  • https://gist.github.com/brandonprry/10745756
  • http://seclists.org/fulldisclosure/2014/Apr/204
  • http://secunia.com/advisories/58001
  • http://www.exploit-db.com/exploits/32885
  • http://www.securityfocus.com/bid/66928

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE