First published: Fri Feb 21 2025(Updated: )
A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=20250208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1536 is classified as a critical severity vulnerability.
CVE-2025-1536 affects the Raisecom Multi-Service Intelligent Gateway up to version 20250208.
To fix CVE-2025-1536, update the Raisecom Multi-Service Intelligent Gateway to a version released after 20250208.
CVE-2025-1536 is a vulnerability in the Request Parameter Handler of the Raisecom Multi-Service Intelligent Gateway.
The vulnerability CVE-2025-1536 affects the file /vpn/vpn_template_style.php.