An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity due to improper control of code generation ('Code Injection’).
References
| Link | Resource |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-073 |
Configurations
No configuration.
History
No history.
Information
Published : 2026-01-13 08:16
Updated : 2026-01-13 14:03
NVD link : CVE-2025-41717
Mitre link : CVE-2025-41717
CVE.ORG link : CVE-2025-41717
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
