An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.
References
Link | Resource |
---|---|
https://smartoffice.expert/en/ | Product |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-034.txt | Exploit Third Party Advisory |
Configurations
History
12 Sep 2025, 17:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:eveo:urve_web_manager:27.02.2025:*:*:*:*:*:*:* | |
First Time |
Eveo
Eveo urve Web Manager |
|
Summary |
|
|
References | () https://smartoffice.expert/en/ - Product | |
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-034.txt - Exploit, Third Party Advisory |
21 Jul 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-78 |
21 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-21 18:15
Updated : 2025-09-12 17:58
NVD link : CVE-2025-36846
Mitre link : CVE-2025-36846
CVE.ORG link : CVE-2025-36846
JSON object : View
Products Affected
eveo
- urve_web_manager
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')