A security flaw has been discovered in neurobin shc up to 4.0.3. Impacted is the function make of the file src/shc.c of the component Environment Variable Handler. The manipulation results in os command injection. The attack is only possible with local access. The exploit has been released to the public and may be exploited.
References
Link | Resource |
---|---|
https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01 | Broken Link |
https://vuldb.com/?ctiid.320557 | Permissions Required VDB Entry |
https://vuldb.com/?id.320557 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.630744 | Third Party Advisory VDB Entry |
https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01 | Broken Link |
Configurations
History
12 Sep 2025, 14:06
Type | Values Removed | Values Added |
---|---|---|
First Time |
Neurobin
Neurobin shc |
|
CPE | cpe:2.3:a:neurobin:shc:*:*:*:*:*:*:*:* | |
References | () https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01 - Broken Link | |
References | () https://vuldb.com/?ctiid.320557 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.320557 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.630744 - Third Party Advisory, VDB Entry |
20 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01 - |
20 Aug 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Aug 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-20 00:15
Updated : 2025-09-12 14:06
NVD link : CVE-2025-9176
Mitre link : CVE-2025-9176
CVE.ORG link : CVE-2025-9176
JSON object : View
Products Affected
neurobin
- shc