Home

Description

Advantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated system administrator to execute arbitrary commands as the web server user (www-data) by supplying a crafted uploaded filename.

PUBLISHED Reserved 2025-04-15 | Published 2025-11-06 | Updated 2025-11-06 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version before 1.1.5
affected

Credits

Alex Williams from Pellera Technologies finder

References

icr.advantech.com/...11/sa-2025-01-vpn-portal-2025-11-06.pdf vendor-advisory patch

www.vulncheck.com/...nd-injection-in-appmanagementcontroller third-party-advisory

icr.advantech.com/download/software product

cve.org (CVE-2025-34239)

nvd.nist.gov (CVE-2025-34239)

Download JSON