CWE-912
Hidden Functionality
The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators.
CVE-2010-20103 (GCVE-0-2010-20103)
Vulnerability from cvelistv5
- CWE-912 - Hidden Functionality
Vendor | Product | Version | ||
---|---|---|---|---|
ProFTPD Project | ProFTPD (Professional FTP Daemon) |
Version: 1.3.3c |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2010-20103", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-22T15:44:16.891816Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-22T15:44:20.670Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/16921" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/15662" }, { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "core daemon" ], "product": "ProFTPD (Professional FTP Daemon)", "repo": "https://github.com/proftpd/proftpd", "vendor": "ProFTPD Project", "versions": [ { "status": "affected", "version": "1.3.3c" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA malicious backdoor was embedded in the official ProFTPD 1.3.3c source tarball distributed between November 28 and December 2, 2010. The backdoor implements a hidden FTP command trigger that, when invoked, causes the server to execute arbitrary shell commands with root privileges. This allows remote, unauthenticated attackers to run any OS command on the FTP server host.\u003c/p\u003e" } ], "value": "A malicious backdoor was embedded in the official ProFTPD 1.3.3c source tarball distributed between November 28 and December 2, 2010. The backdoor implements a hidden FTP command trigger that, when invoked, causes the server to execute arbitrary shell commands with root privileges. This allows remote, unauthenticated attackers to run any OS command on the FTP server host." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "CWE-912 Hidden Functionality", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-20T15:38:46.697Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://web.archive.org/web/20111107212129/http://rsync.proftpd.org/" }, { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/15662" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/16921" }, { "tags": [ "third-party-advisory" ], "url": "https://advisories.checkpoint.com/defense/advisories/public/2011/cpai-2010-151.html/" }, { "tags": [ "product" ], "url": "https://github.com/proftpd/proftpd" }, { "tags": [ "product" ], "url": "http://www.proftpd.org/" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/proftpd-backdoor-command-execution" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "x_known-exploited-vulnerability" ], "title": "ProFTPD 1.3.3c Backdoor Command Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2010-20103", "datePublished": "2025-08-20T15:38:46.697Z", "dateReserved": "2025-08-19T16:00:37.400Z", "dateUpdated": "2025-08-22T15:44:20.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-10018 (GCVE-0-2011-10018)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
myBB Group | Forum Software |
Version: 1.6.4 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2011-10018", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T14:07:57.715204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T14:08:01.308Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/17949" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "index.php", "collapsed cookie" ], "product": "Forum Software", "vendor": "myBB Group", "versions": [ { "status": "affected", "version": "1.6.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "MyBB" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "myBB version 1.6.4 was distributed with an unauthorized backdoor embedded in the source code. The backdoor allowed remote attackers to execute arbitrary PHP code by injecting payloads into a specially crafted collapsed cookie. This vulnerability was introduced during packaging and was not part of the intended application logic. Exploitation requires no authentication and results in full compromise of the web server under the context of the web application." } ], "value": "myBB version 1.6.4 was distributed with an unauthorized backdoor embedded in the source code. The backdoor allowed remote attackers to execute arbitrary PHP code by injecting payloads into a specially crafted collapsed cookie. This vulnerability was introduced during packaging and was not part of the intended application logic. Exploitation requires no authentication and results in full compromise of the web server under the context of the web application." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "CWE-912 Hidden Functionality", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-13T20:35:31.755Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/17949" }, { "tags": [ "third-party-advisory" ], "url": "https://web.archive.org/web/20111015224948/http://secunia.com/advisories/46300/" }, { "tags": [ "vendor-advisory", "patch" ], "url": "https://blog.mybb.com/2011/10/06/1-6-4-security-vulnerabilit/" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/mybb-backdoor-arbitrary-command-execution" } ], "source": { "discovery": "UNKNOWN" }, "title": "myBB 1.6.4 Backdoor Arbitrary Command Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2011-10018", "datePublished": "2025-08-13T20:35:31.755Z", "dateReserved": "2025-08-13T17:52:08.905Z", "dateUpdated": "2025-08-14T14:08:01.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25371 (GCVE-0-2021-25371)
Vulnerability from cvelistv5
- CWE-912 - Hidden Functionality
▼ | URL | Tags |
---|---|---|
https://security.samsungmobile.com/securityUpdate.smsb | x_refsource_CONFIRM | |
https://security.samsungmobile.com | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Samsung Mobile | Samsung Mobile Devices |
Version: Q(10.0), R(11.0) devices with exynos980, exynos2100, exynos9830 < SMR Mar-2021 Release 1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:03:05.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.samsungmobile.com" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-25371", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T21:25:24.513863Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-06-29", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25371" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:38:15.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2023-06-29T00:00:00+00:00", "value": "CVE-2021-25371 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Samsung Mobile Devices", "vendor": "Samsung Mobile", "versions": [ { "lessThan": "SMR Mar-2021 Release 1", "status": "affected", "version": "Q(10.0), R(11.0) devices with exynos980, exynos2100, exynos9830", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in DSP driver prior to SMR Mar-2021 Release 1 allows attackers load arbitrary ELF libraries inside DSP." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "CWE-912: Hidden Functionality", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-26T18:24:15.000Z", "orgId": "3af57064-a867-422c-b2ad-40307b65c458", "shortName": "Samsung Mobile" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.samsungmobile.com" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Samsung Mobile Devices", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "Q(10.0), R(11.0) devices with exynos980, exynos2100, exynos9830", "version_value": "SMR Mar-2021 Release 1" } ] } } ] }, "vendor_name": "Samsung Mobile" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in DSP driver prior to SMR Mar-2021 Release 1 allows attackers load arbitrary ELF libraries inside DSP." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-912: Hidden Functionality" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.samsungmobile.com/securityUpdate.smsb", "refsource": "CONFIRM", "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "name": "https://security.samsungmobile.com", "refsource": "MISC", "url": "https://security.samsungmobile.com" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458", "assignerShortName": "Samsung Mobile", "cveId": "CVE-2021-25371", "datePublished": "2021-03-26T18:24:15.000Z", "dateReserved": "2021-01-19T00:00:00.000Z", "dateUpdated": "2025-07-30T01:38:15.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20439 (GCVE-0-2024-20439)
Vulnerability from cvelistv5
- CWE-912 - Hidden Functionality
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Smart License Utility |
Version: 2.1.0 Version: 2.0.0 Version: 2.2.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:cisco_smart_license_utility:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cisco_smart_license_utility", "vendor": "cisco", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.2.0" } ] }, { "cpes": [ "cpe:2.3:a:cisco:cisco_smart_license_utility:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cisco_smart_license_utility", "vendor": "cisco", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.2.0" } ] }, { "cpes": [ "cpe:2.3:a:cisco:cisco_smart_license_utility:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cisco_smart_license_utility", "vendor": "cisco", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.2.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20439", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:12:06.667412Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-03-31", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20439" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:33.943Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-03-31T00:00:00+00:00", "value": "CVE-2024-20439 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Smart License Utility", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential.\r\n\r This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API." } ], "exploits": [ { "lang": "en", "value": "In March 2025, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "Hidden Functionality", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-01T21:36:38.960Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cslu-7gHMzWmw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw" } ], "source": { "advisory": "cisco-sa-cslu-7gHMzWmw", "defects": [ "CSCwi41731" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20439", "datePublished": "2024-09-04T16:28:39.669Z", "dateReserved": "2023-11-08T15:08:07.670Z", "dateUpdated": "2025-07-30T01:36:33.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30064 (GCVE-0-2025-30064)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
CGM | CGM CLININET |
Version: 0 < 2025.MS2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30064", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-27T13:25:40.487947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-27T13:25:58.795Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CGM CLININET", "vendor": "CGM", "versions": [ { "lessThan": "2025.MS2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Maciej Kazulak" } ], "datePublic": "2025-08-27T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An insufficiently secured internal function allows session generation for arbitrary users. The decodeParam function checks the JWT but does not verify which signing algorithm was used. As a result, an attacker can use the \"ex:action\" parameter in the VerifyUserByThrustedService function to generate a session for any user." } ], "value": "An insufficiently secured internal function allows session generation for arbitrary users. The decodeParam function checks the JWT but does not verify which signing algorithm was used. As a result, an attacker can use the \"ex:action\" parameter in the VerifyUserByThrustedService function to generate a session for any user." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.8, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "CWE-912 Hidden Functionality", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-27T10:25:20.090Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/en/posts/2025/08/CVE-2025-2313/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Possibility to generate a session for any user via the \"ex:action\" parameter after obtaining access to the JWT key", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-30064", "datePublished": "2025-08-27T10:25:20.090Z", "dateReserved": "2025-03-14T14:55:39.571Z", "dateUpdated": "2025-08-27T13:25:58.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-34117 (GCVE-0-2025-34117)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://web.archive.org/web/20140828114943/http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/ | third-party-advisory, technical-description | |
https://www.seebug.org/vuldb/ssvid-90227 | third-party-advisory, technical-description | |
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/netcore_udp_53413_backdoor.rb | exploit | |
https://www.shadowserver.org/what-we-do/network-reporting/netcore-netis-router-vulnerability-scan-report/ | third-party-advisory | |
https://vulners.com/metasploit/MSF:EXPLOIT-LINUX-MISC-NETCORE_UDP_53413_BACKDOOR- | third-party-advisory, exploit | |
https://www.vulncheck.com/advisories/netcore-netis-routers-backdoor-rce | third-party-advisory | |
https://www.exploit-db.com/exploits/43387 | exploit |
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Netcore Technology | Router firmware |
Version: Prior to August 2014 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-34117", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T18:23:29.099684Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T18:40:31.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "UDP port 53413" ], "product": "Router firmware", "vendor": "Netcore Technology", "versions": [ { "status": "affected", "version": "Prior to August 2014" } ] }, { "defaultStatus": "affected", "modules": [ "UDP port 53413" ], "product": "Router firmware", "vendor": "Netis", "versions": [ { "status": "affected", "version": "Prior to August 2014" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Trend Micro TrendLabs" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A remote code execution vulnerability exists in multiple Netcore and Netis routers models with firmware released prior to August 2014 due to the presence of an undocumented backdoor listener on UDP port 53413. Exact version boundaries remain undocumented. An unauthenticated remote attacker can send specially crafted UDP packets to execute arbitrary commands on the affected device. This backdoor uses a hardcoded authentication mechanism and accepts shell commands post-authentication. Some device models include a non-standard implementation of the `echo` command, which may affect exploitability." } ], "value": "A remote code execution vulnerability exists in multiple Netcore and Netis routers models with firmware released prior to August 2014 due to the presence of an undocumented backdoor listener on UDP port 53413. Exact version boundaries remain undocumented. An unauthenticated remote attacker can send specially crafted UDP packets to execute arbitrary commands on the affected device. This backdoor uses a hardcoded authentication mechanism and accepts shell commands post-authentication. Some device models include a non-standard implementation of the `echo` command, which may affect exploitability." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "CWE-912 Hidden Functionality", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-16T21:02:57.281Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory", "technical-description" ], "url": "https://web.archive.org/web/20140828114943/http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/" }, { "tags": [ "third-party-advisory", "technical-description" ], "url": "https://www.seebug.org/vuldb/ssvid-90227" }, { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/netcore_udp_53413_backdoor.rb" }, { "tags": [ "third-party-advisory" ], "url": "https://www.shadowserver.org/what-we-do/network-reporting/netcore-netis-router-vulnerability-scan-report/" }, { "tags": [ "third-party-advisory", "exploit" ], "url": "https://vulners.com/metasploit/MSF:EXPLOIT-LINUX-MISC-NETCORE_UDP_53413_BACKDOOR-" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/netcore-netis-routers-backdoor-rce" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/43387" } ], "source": { "discovery": "UNKNOWN" }, "title": "Netcore / Netis Routers RCE via UDP Port 53413 Backdoor", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2025-34117", "datePublished": "2025-07-16T21:02:57.281Z", "dateReserved": "2025-04-15T19:15:22.561Z", "dateUpdated": "2025-07-17T18:40:31.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-46267 (GCVE-0-2025-46267)
Vulnerability from cvelistv5
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
- CWE-912 - Hidden functionality
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | ELECOM CO.,LTD. | WRC-BE36QS-B |
Version: v1.1.3 and earlier |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-46267", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-22T19:51:45.796210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-22T19:52:13.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WRC-BE36QS-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.1.3 and earlier" } ] }, { "product": "WRC-W701-B", "vendor": "ELECOM CO.,LTD.", "versions": [ { "status": "affected", "version": "v1.1.3 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Hidden functionality issue exists in WRC-BE36QS-B and WRC-W701-B. If exploited, the product\u0027s hidden debug function may be enabled by a remote attacker who can log in to WebGUI." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "Hidden functionality", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-22T09:30:21.865Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.elecom.co.jp/news/security/20250722-01/" }, { "url": "https://jvn.jp/en/vu/JVNVU91615135/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-46267", "datePublished": "2025-07-22T09:30:21.865Z", "dateReserved": "2025-07-11T04:29:09.104Z", "dateUpdated": "2025-07-22T19:52:13.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-47729 (GCVE-0-2025-47729)
Vulnerability from cvelistv5
- CWE-912 - Hidden Functionality
Vendor | Product | Version | ||
---|---|---|---|---|
TeleMessage | archiving backend |
Version: 0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-47729", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-12T18:07:05.435359Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-05-12", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-47729" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:13.462Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-05-12T00:00:00+00:00", "value": "CVE-2025-47729 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "archiving backend", "vendor": "TeleMessage", "versions": [ { "lessThanOrEqual": "2025-05-05", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage \"End-to-End encryption from the mobile phone through to the corporate archive\" documentation, as exploited in the wild in May 2025." } ], "metrics": [ { "cvssV3_1": { "baseScore": 1.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "CWE-912 Hidden Functionality", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-08T13:21:54.215Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://news.ycombinator.com/item?id=43909220" }, { "url": "https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/" }, { "url": "https://www.theregister.com/2025/05/05/telemessage_investigating/" } ], "tags": [ "exclusively-hosted-service" ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-47729", "datePublished": "2025-05-08T00:00:00.000Z", "dateReserved": "2025-05-08T00:00:00.000Z", "dateUpdated": "2025-07-30T01:36:13.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-55075 (GCVE-0-2025-55075)
Vulnerability from cvelistv5
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
- CWE-912 - Hidden functionality
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | I-O DATA DEVICE, INC. | WN-7D36QR |
Version: firmware Ver.1.1.3 and prior versions |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55075", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-17T13:37:37.096884Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-17T13:38:05.944Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WN-7D36QR", "vendor": "I-O DATA DEVICE, INC.", "versions": [ { "status": "affected", "version": "firmware Ver.1.1.3 and prior versions" } ] }, { "product": "WN-7D36QR/UE", "vendor": "I-O DATA DEVICE, INC.", "versions": [ { "status": "affected", "version": "firmware Ver.1.1.3 and prior versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Hidden functionality issue exists in WN-7D36QR and WN-7D36QR/UE. If this vulnerability is exploited, SSH may be enabled by a remote authenticated attacker." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "Hidden functionality", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-17T03:08:37.275Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.iodata.jp/support/information/2025/09_wn-7d36qr/index.htm" }, { "url": "https://jvn.jp/en/vu/JVNVU97490987/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-55075", "datePublished": "2025-09-17T03:08:37.275Z", "dateReserved": "2025-09-10T08:04:14.006Z", "dateUpdated": "2025-09-17T13:38:05.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6839 (GCVE-0-2025-6839)
Vulnerability from cvelistv5
- CWE-912 - Backdoor
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.314282 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.314282 | signature, permissions-required | |
https://vuldb.com/?submit.603176 | third-party-advisory | |
https://note-hxlab.wetolink.com/share/LZJIef0phS6B | related | |
https://note-hxlab.wetolink.com/share/LZJIef0phS6B#proof-of-concept- | exploit |
Vendor | Product | Version | ||
---|---|---|---|---|
Conjure | Position Department Service Quality Evaluation System |
Version: 1.0.0 Version: 1.0.1 Version: 1.0.2 Version: 1.0.3 Version: 1.0.4 Version: 1.0.5 Version: 1.0.6 Version: 1.0.7 Version: 1.0.8 Version: 1.0.9 Version: 1.0.10 Version: 1.0.11 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6839", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-30T20:13:55.594878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-30T20:14:14.689Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Position Department Service Quality Evaluation System", "vendor": "Conjure", "versions": [ { "status": "affected", "version": "1.0.0" }, { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "1.0.2" }, { "status": "affected", "version": "1.0.3" }, { "status": "affected", "version": "1.0.4" }, { "status": "affected", "version": "1.0.5" }, { "status": "affected", "version": "1.0.6" }, { "status": "affected", "version": "1.0.7" }, { "status": "affected", "version": "1.0.8" }, { "status": "affected", "version": "1.0.9" }, { "status": "affected", "version": "1.0.10" }, { "status": "affected", "version": "1.0.11" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "YELEIPENG (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Conjure Position Department Service Quality Evaluation System up to 1.0.11. Affected by this issue is the function eval of the file public/assets/less/bootstrap-less/mixins/head.php. The manipulation of the argument payload leads to backdoor. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine kritische Schwachstelle wurde in Conjure Position Department Service Quality Evaluation System bis 1.0.11 entdeckt. Dies betrifft die Funktion eval der Datei public/assets/less/bootstrap-less/mixins/head.php. Dank Manipulation des Arguments payload mit unbekannten Daten kann eine backdoor-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "Backdoor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-29T01:31:08.475Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-314282 | Conjure Position Department Service Quality Evaluation System head.php eval backdoor", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.314282" }, { "name": "VDB-314282 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.314282" }, { "name": "Submit #603176 | conjure Position Department Service Quality Evaluation System \u003c=1.0.11 Command Shell in Externally Accessible Directory", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.603176" }, { "tags": [ "related" ], "url": "https://note-hxlab.wetolink.com/share/LZJIef0phS6B" }, { "tags": [ "exploit" ], "url": "https://note-hxlab.wetolink.com/share/LZJIef0phS6B#proof-of-concept-" } ], "timeline": [ { "lang": "en", "time": "2025-06-27T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-27T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-27T20:43:47.000Z", "value": "VulDB entry last update" } ], "title": "Conjure Position Department Service Quality Evaluation System head.php eval backdoor" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6839", "datePublished": "2025-06-29T01:31:08.475Z", "dateReserved": "2025-06-27T18:38:39.170Z", "dateUpdated": "2025-06-30T20:14:14.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Installation
Description:
- Always verify the integrity of the product that is being installed.
Mitigation
Phase: Testing
Description:
- Conduct a code coverage analysis using live testing, then closely inspect any code that is not covered.
CAPEC-133: Try All Common Switches
An attacker attempts to invoke all common switches and options in the target application for the purpose of discovering weaknesses in the target. For example, in some applications, adding a --debug switch causes debugging information to be displayed, which can sometimes reveal sensitive processing or configuration information to an attacker. This attack differs from other forms of API abuse in that the attacker is indiscriminately attempting to invoke options in the hope that one of them will work rather than specifically targeting a known option. Nonetheless, even if the attacker is familiar with the published options of a targeted application this attack method may still be fruitful as it might discover unpublicized functionality.
CAPEC-190: Reverse Engineer an Executable to Expose Assumed Hidden Functionality
An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how the software functions and operates. This type of analysis is also referred to as Reverse Code Engineering, as techniques exist for extracting source code from an executable. Several techniques are often employed for this purpose, both black box and white box. The use of computer bus analyzers and packet sniffers allows the binary to be studied at a level of interactions with its computing environment, such as a host OS, inter-process communication, and/or network communication. This type of analysis falls into the 'black box' category because it involves behavioral analysis of the software without reference to source code, object code, or protocol specifications.