Home

Description

NetSupport Manager < 14.12.0001 contains an arbitrary file write vulnerability in its Connectivity Server/Gateway PUTFILE request handler. An attacker with a valid Gateway Key can supply a crafted filename containing directory traversal sequences to write files to arbitrary locations on the server. This can be leveraged to place attacker-controlled DLLs or executables in privileged paths and achieve remote code execution in the context of the NetSupport Manager connectivity service.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-15 | Updated 2025-12-15 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 14.12.0001
affected

Credits

Chris Leech finder

References

kb.netsupportsoftware.com/...nd-securing-netsupport-manager/ vendor-advisory patch

www.vulncheck.com/...ated-path-traversal-arbitrary-write-rce third-party-advisory

ret2.me/post/2025-12-04-exploiting-netsupport-gateway/ technical-description exploit

cve.org (CVE-2025-34181)

nvd.nist.gov (CVE-2025-34181)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.