Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems.
* vulnerabilities:
*
Improper Neutralization of Special Elements used in a Command ('Command Injection')
* Use of Hard-coded Credentials
* Improper Authentication
* Binding to an Unrestricted IP Address
The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required.
References
Link | Resource |
---|---|
https://www.protns.com/53 |
Configurations
No configuration.
History
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Jul 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-15 08:15
Updated : 2025-07-15 13:14
NVD link : CVE-2025-3621
Mitre link : CVE-2025-3621
CVE.ORG link : CVE-2025-3621
JSON object : View
Products Affected
No product.