CVE-2025-1037

By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context.
CVSS

No CVSS.

Configurations

No configuration.

History

28 Oct 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-28 13:15

Updated : 2025-10-28 13:15


NVD link : CVE-2025-1037

Mitre link : CVE-2025-1037

CVE.ORG link : CVE-2025-1037


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management