SKYSEA Client View Ver.11.221.03 and earlier allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.
https://jvn.jp/en/jp/JVN84995847/index.html
http://www.securityfocus.com/bid/95062
https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html
https://securityaffairs.com/183479/security/u-s-cisa-adds-skysea-client-view-rapid7-velociraptor-microsoft-windows-and-igel-os-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html
https://www.cisa.gov/news-events/alerts/2025/10/14/cisa-adds-five-known-exploited-vulnerabilities-catalog
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-7836
http://www.skyseaclientview.net/news/161221/
Source: Mitre, NVD
Published: 2017-06-09
Updated: 2025-10-22
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.38532