Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Va Max
Va Max va Max |
|
| Vendors & Products |
Va Max
Va Max va Max |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | VA MAX 8.3.4 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter. Attackers can send POST requests to the changeip.php endpoint with malicious payload in the mtu_eth0 field to execute commands as the apache user. | |
| Title | VA MAX 8.3.4 Remote Code Execution via changeip.php | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T15:20:30.826Z
Reserved: 2026-04-05T13:13:20.865Z
Link: CVE-2019-25671
Updated: 2026-04-06T15:20:28.078Z
Status : Deferred
Published: 2026-04-05T21:16:44.780
Modified: 2026-04-16T16:15:56.380
Link: CVE-2019-25671
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:48:37Z