source: https://www.securityfocus.com/bid/58450/info
fastreader is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary commands in the context of the affected application.
fastreader 1.0.8 is affected; other versions may also be vulnerable.
The following example URI is available:
http://www.g;id;.com