Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems.
* vulnerabilities:
*
Improper Neutralization of Special Elements used in a Command ('Command Injection')
* Use of Hard-coded Credentials
* Improper Authentication
* Binding to an Unrestricted IP Address
The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.protns.com/53 |
|
History
Tue, 15 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Tue, 15 Jul 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems. * vulnerabilities: * Improper Neutralization of Special Elements used in a Command ('Command Injection') * Use of Hard-coded Credentials * Improper Authentication * Binding to an Unrestricted IP Address The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required. | |
| Title | Remote Code Execution in ProTNS ActADUR | |
| Weaknesses | CWE-1327 CWE-287 CWE-77 CWE-798 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: FSI
Published: 2025-07-15T07:22:49.897Z
Updated: 2025-07-15T13:30:22.159Z
Reserved: 2025-04-15T00:51:18.177Z
Link: CVE-2025-3621
Updated: 2025-07-15T13:30:17.976Z
Status : Awaiting Analysis
Published: 2025-07-15T08:15:31.917
Modified: 2025-07-15T13:14:24.053
Link: CVE-2025-3621
No data.