Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 23 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bambulab
Bambulab bambu Studio |
|
| Vendors & Products |
Bambulab
Bambulab bambu Studio |
Wed, 22 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bambu Studio 2.1.1.52 and earlier is affected by a vulnerability that allows arbitrary code execution during application startup. The application loads a network plugin without validating its digital signature or verifying its authenticity. A local attacker can exploit this behavior by placing a malicious component in the expected location, which is controllable by the attacker (e.g., under %APPDATA%), resulting in code execution within the context of the user. The main application is digitally signed, which may allow a malicious component to inherit trust and evade detection by security solutions that rely on signed parent processes. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-22T19:11:33.350Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57521
Updated: 2025-10-21T20:23:53.409Z
Status : Deferred
Published: 2025-10-21T15:15:38.960
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-57521
No data.
OpenCVE Enrichment
Updated: 2025-10-23T15:17:00Z