A vulnerability was determined in neurobin shc up to 4.0.3. This vulnerability affects the function make of the file src/shc.c of the component Filename Handler. Executing manipulation can lead to os command injection. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized.
References
Link | Resource |
---|---|
https://magnificent-dill-351.notion.site/Command-Execution-in-shc-4-0-3-249c693918ed8040abe3e636c7f18c96 | Broken Link |
https://vuldb.com/?ctiid.320555 | Permissions Required VDB Entry |
https://vuldb.com/?id.320555 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.630742 | Third Party Advisory VDB Entry |
https://magnificent-dill-351.notion.site/Command-Execution-in-shc-4-0-3-249c693918ed8040abe3e636c7f18c96 | Broken Link |
Configurations
History
15 Sep 2025, 19:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:neurobin:shc:*:*:*:*:*:*:*:* | |
First Time |
Neurobin
Neurobin shc |
|
References | () https://magnificent-dill-351.notion.site/Command-Execution-in-shc-4-0-3-249c693918ed8040abe3e636c7f18c96 - Broken Link | |
References | () https://vuldb.com/?ctiid.320555 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.320555 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.630742 - Third Party Advisory, VDB Entry |
20 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://magnificent-dill-351.notion.site/Command-Execution-in-shc-4-0-3-249c693918ed8040abe3e636c7f18c96 - |
20 Aug 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-19 23:15
Updated : 2025-09-15 19:54
NVD link : CVE-2025-9174
Mitre link : CVE-2025-9174
CVE.ORG link : CVE-2025-9174
JSON object : View
Products Affected
neurobin
- shc