// For flags

CVE-2014-125118

eScan 5.5-2 Web Management Console Command Injection

Severity Score

9.4
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.

Existe una vulnerabilidad de inyección de comandos en eScan Web Management Console version 5.5-2. La aplicación no depura correctamente el parámetro "pass" al procesar solicitudes de inicio de sesión en login.php, lo que permite a un atacante autenticado con un nombre de usuario válido inyectar comandos arbitrarios mediante una contraseña especialmente manipulada. Una explotación exitosa resulta en la ejecución remota de código. Es posible escalar privilegios a root mediante el uso abusivo de la utilidad runasroot con privilegios de nivel mwconf.

*Credits: Joxean Koret
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
High
Integrity
High
High
Availability
High
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2025-07-24 CVE Reserved
  • 2025-07-25 CVE Published
  • 2025-07-29 CVE Updated
  • 2025-07-29 First Exploit
  • 2025-07-31 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-306: Missing Authentication for Critical Function
CAPEC
  • CAPEC-88: OS Command Injection
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -