An unauthenticated arbitrary file upload vulnerability exists in Idera Up.Time Monitoring Station versions up to and including 7.2. The `wizards/post2file.php` script accepts arbitrary POST parameters, allowing attackers to upload crafted PHP files to the webroot. Successful exploitation results in remote code execution as the web server user. NOTE: The bypass for this vulnerability is tracked as CVE-2015-9263.
- https://www.exploit-db.com/exploits/38732
- https://www.vulncheck.com/advisories/idera-uptime-arbitrary-file-upload-rce
No PoCs found on GitHub currently.