VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
References
| Link | Resource |
|---|---|
| https://github.com/veepn/veepn | Broken Link |
| https://veepn.com/ | Product |
| https://www.exploit-db.com/exploits/52088 | Exploit |
| https://www.vulncheck.com/advisories/veevpn-161-unquoted-service-path-remote-code-execution | Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/52088 | Exploit |
Configurations
History
No history.
Information
Published : 2025-12-04 21:16
Updated : 2025-12-30 16:33
NVD link : CVE-2025-66575
Mitre link : CVE-2025-66575
CVE.ORG link : CVE-2025-66575
JSON object : View
Products Affected
veepn
- veepn
CWE
CWE-428
Unquoted Search Path or Element
