Home

Description

Airlink's Daemon interfaces with Docker and the Panel to provide secure access for controlling instances via the Panel. In version 1.0.0, an attacker with access to the affected container can create symbolic links inside the mounted directory (/app/data). Because the container bind-mounts an arbitrary host path, these symlinks can point to sensitive locations on the host filesystem. When the application or other processes follow these symlinks, the attacker can gain unauthorized read access to host files outside the container. This issue has been patched in version 1.0.1.

PUBLISHED Reserved 2025-08-20 | Published 2025-08-25 | Updated 2025-08-25 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-61: UNIX Symbolic Link (Symlink) Following

Product status

= 1.0.0
affected

References

github.com/...daemon/security/advisories/GHSA-hrfv-wm8p-mg8m

github.com/...ommit/5e6222dd9eec6d7cb0876b12507e3d6011797693

cve.org (CVE-2025-57802)

nvd.nist.gov (CVE-2025-57802)

Download JSON