source: https://www.securityfocus.com/bid/58450/info fastreader is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary commands in the context of the affected application. fastreader 1.0.8 is affected; other versions may also be vulnerable. The following example URI is available: http://www.g;id;.com