Description
A malicious user with administrative privileges in the web portal would be able to manipulate the Diagnostics module to obtain remote code execution on the local device as a low privileged user.
Published: 2025-05-30
Score: 6.6 Medium
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16470 A malicious user with administrative privileges in the web portal would be able to manipulate the Diagnostics module to obtain remote code execution on the local device as a low privileged user.
References
History

Fri, 30 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 May 2025 08:30:00 +0000

Type Values Removed Values Added
Description A malicious user with administrative privileges in the web portal would be able to manipulate the Diagnostics module to obtain remote code execution on the local device as a low privileged user.
Title Remote Code Execution
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2025-05-30T13:01:33.991Z

Reserved: 2025-05-13T01:42:17.626Z

Link: CVE-2025-4635

cve-icon Vulnrichment

Updated: 2025-05-30T13:01:29.915Z

cve-icon NVD

Status : Deferred

Published: 2025-05-30T09:15:25.677

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4635

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses