CVE-2025-59737
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-02
Last updated on: 2025-10-02
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/clt/LOGINFRM_LXA.ASP'.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| andsoft | e-tms | 25.03 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an operating system command injection in AndSoft's e-TMS v25.03. It allows an attacker to execute arbitrary operating system commands on the server by sending a specially crafted POST request to the '/clt/LOGINFRM_LXA.ASP' endpoint, specifically exploiting the 'm' parameter.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute arbitrary commands on the server, potentially leading to full system compromise, data theft, data loss, or disruption of services.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70