9.3 RCE in a security tool affecting 50k+ machines, paying €250 - is it worth it?
I found an RCE requiring user interaction (clicking ok to a popup) which can be triggered by any site and spammed until the user clicks okay.
This RCE is in a security tool and it's been reported through a bounty platform, but with an expected payout of €250, this feels like a waste of time.
The value here is in the blog post which I'm going to write to build credibility for my company, but this just feels wrong that they're trying to get away with such low bounties.
The RCE allows native code execution on the host machine and the platform has downgraded the vuln to a 8.6 as the scope is "unchanged" which it just isn't.
I'm seeing this more and more often where platforms downgrade vulns and payments just get put down to the point where it makes more sense to just not report them as it feels like a waste of time, they've now asked me to provide more information (after downgrading it) for step by step PoC instructions, but I've included the PoC code and a demo video.