CVE-2025-34247

6.5 MEDIUM

📋 TL;DR

Advantech WebAccess/VPN versions before 1.1.5 contain a SQL injection vulnerability in the NetworksController.addNetworkAction() function. Authenticated low-privileged users can exploit this via datatable search parameters to extract database information. This affects organizations using vulnerable Advantech VPN portal installations.

💻 Affected Systems

Products:
  • Advantech WebAccess/VPN
Versions: Versions prior to 1.1.5
Operating Systems: Not specified, likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but low-privileged observer accounts can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise including credentials, configuration data, and sensitive network information leading to lateral movement and complete system takeover.

🟠

Likely Case

Disclosure of database contents including user information, network configurations, and potentially credential hashes that could be cracked offline.

🟢

If Mitigated

Limited information disclosure from database tables accessible to the application's database user account.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection via search parameters is a well-understood attack vector. Requires authenticated access but low privileges are sufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.5

Vendor Advisory: https://icr.advantech.com/support/router-models/download/511/sa-2025-01-vpn-portal-2025-11-06.pdf

Restart Required: Yes

Instructions:

1. Download version 1.1.5 or later from https://icr.advantech.com/download/software
2. Backup current configuration and database
3. Install the update following vendor documentation
4. Restart the VPN portal service
5. Verify successful update and functionality

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to block SQL injection patterns in search parameters

Database User Privilege Reduction

all

Reduce database account privileges to minimum required for application functionality

🧯 If You Can't Patch

  • Implement network segmentation to isolate VPN portal from sensitive systems
  • Enable detailed logging and monitoring for SQL injection attempts in application logs

🔍 How to Verify

Check if Vulnerable:

Check Advantech WebAccess/VPN version in administration interface. If version is below 1.1.5, system is vulnerable.

Check Version:

Check via Advantech WebAccess/VPN web interface administration panel or consult vendor documentation for CLI version check.

Verify Fix Applied:

Verify version is 1.1.5 or higher in administration interface and test search functionality with SQL injection payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by search parameter manipulation
  • Application logs showing SQL syntax errors

Network Indicators:

  • Unusual database connection patterns from VPN portal
  • HTTP requests containing SQL keywords in search parameters

SIEM Query:

source="advantech_vpn" AND ("SELECT" OR "UNION" OR "INSERT" OR "UPDATE" OR "DELETE") AND "search"

🔗 References

📤 Share & Export