Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 04 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 17 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech webaccess\/vpn
|
|
| CPEs | cpe:2.3:a:advantech:webaccess\/vpn:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Advantech webaccess\/vpn
|
Fri, 07 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech webaccess/vpn |
|
| Vendors & Products |
Advantech
Advantech webaccess/vpn |
Thu, 06 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Advantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated system administrator to execute arbitrary commands as the web server user (www-data) by supplying a crafted uploaded filename. | |
| Title | Advantech WebAccess/VPN < 1.1.5 Command Injection in AppManagementController.appUpgradeAction() | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T19:38:10.205Z
Reserved: 2025-04-15T19:15:22.575Z
Link: CVE-2025-34239
Updated: 2025-11-06T20:58:35.126Z
Status : Analyzed
Published: 2025-11-06T20:15:47.757
Modified: 2025-12-04T21:27:21.903
Link: CVE-2025-34239
No data.
OpenCVE Enrichment
Updated: 2025-11-07T10:53:45Z