First published: Wed Apr 30 2025(Updated: )
A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch ctrlX OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24351 has been rated as critical due to its potential to allow remote command execution as the root user.
To mitigate CVE-2025-24351, update to the latest version of Bosch ctrlX OS that addresses this vulnerability.
CVE-2025-24351 affects users of Bosch ctrlX OS with the remote logging feature enabled.
CVE-2025-24351 allows an authenticated low-privileged attacker to execute arbitrary OS commands on affected systems.
Yes, CVE-2025-24351 requires the attacker to be authenticated as a low-privileged user to exploit this vulnerability.