CVE-2025-54306
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thermofisher | torrent_suite_software | 5.18.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Thermo Fisher Torrent Suite Django application 5.18.1 and allows remote code execution. It occurs because the application processes network configuration parameters through administrative endpoints without proper input validation. Specifically, user-supplied data is passed to Bash scripts that set environment variables without sanitization. These scripts then execute a source command on /etc/environment, which can be exploited by an attacker to inject malicious commands and execute arbitrary code on the server.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with access to the administrative network configuration endpoint to execute arbitrary commands on the server remotely. This could lead to full compromise of the server, unauthorized access to sensitive data, disruption of services, or further attacks within the network.