# Remote Code Execution

<figure><img src="https://media1.giphy.com/media/3orifiiuxBpn9QNGmI/giphy.gif?cid=ecf05e47g2onuj8mriwxuy3196sjdgwva6zofjz73q5s7t3z&#x26;ep=v1_gifs_search&#x26;rid=giphy.gif&#x26;ct=g" alt="" width="375"><figcaption></figcaption></figure>

<details>

<summary>What is RCE ?</summary>

If an attacker **gains control** of a target computer through some sort of vulnerability, and they also gain the power to **execute commands on that remote computer** this process is called **Remote Code Execution (RCE)**

* It is one of the cyber-attacks where an attacker can remotely execute commands on someone’s computer
* It usually occurs due to malicious malware downloaded by the host and can happen regardless of the geographic location of the device.

**How is it possible ?**

*With RCE, hackers can edit or destroy important files, steal confidential data, perform DDoS (Distributed Denial of Service) attacks, and compromise the entire system.*

**The attacks can be occurred due to:**

* *External user input unchecked*
* *Access control is poor*
* *Authentication measures are not properly done*
* *Buffer overflow.*

</details>

{% embed url="<https://www.exploit-db.com/papers/12885>" %}
