CVE-2025-9016
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-15

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in Mechrevo Control Center GX V2 5.56.51.48. This affects an unknown part of the file C:\Program Files\OEM\机械革命控制中心\AiStoneService\MyControlCenter\Command of the component Powershell Script Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-15
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2025-08-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mechrevo control_center_gx_v2 5.56.51.48
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-426 The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Mechrevo Control Center GX V2 5.56.51.48, specifically in the Powershell Script Handler component. It involves manipulation that leads to an uncontrolled search path, which means the software may execute unintended or malicious scripts due to improper handling of file paths. Exploiting this vulnerability requires local access and is considered difficult due to high attack complexity.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to execution of unauthorized code with potentially high impact on confidentiality, integrity, and availability of the affected system. Since it requires local access and is difficult to exploit, the risk is somewhat limited, but successful exploitation could allow an attacker to compromise the system or escalate privileges.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart