CVE-2025-5106

7.3 HIGH

📋 TL;DR

This critical vulnerability in Fujian Kelixun 1.0 allows remote attackers to execute arbitrary operating system commands via command injection in the fax_view.php file. Attackers can exploit this to gain unauthorized access and control over affected systems. Any organization using Fujian Kelixun 1.0 with the vulnerable component exposed is at risk.

💻 Affected Systems

Products:
  • Fujian Kelixun
Versions: 1.0
Operating Systems: Unknown - Likely Linux-based given PHP component
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the fax_view.php component when handling fax_file arguments. All installations with this component enabled are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, install malware, exfiltrate data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data theft, system disruption, or deployment of ransomware/cryptominers on vulnerable servers.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and input validation are implemented, though exploitation may still occur.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit details exist, making internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or attackers who breach perimeter defenses.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly disclosed on GitHub, making it easy for attackers to weaponize. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch exists. Consider workarounds or replacing the software if vendor does not provide updates.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and sanitization for the fax_file parameter to prevent command injection.

# Example PHP input sanitization
$fax_file = escapeshellarg($_GET['fax_file']);
# Use whitelisting for allowed characters
if (!preg_match('/^[a-zA-Z0-9._-]+$/', $fax_file)) {
    die('Invalid input');
}

Disable or Restrict Access

linux

Disable the vulnerable fax_view.php component or restrict access via web server configuration.

# Apache: Deny access to fax_view.php
<Location "/app/fax/fax_view.php">
    Deny from all
</Location>
# Nginx: Block access
location /app/fax/fax_view.php {
    deny all;
}

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical assets
  • Deploy web application firewall (WAF) rules to block command injection patterns

🔍 How to Verify

Check if Vulnerable:

Check if /app/fax/fax_view.php exists and accepts fax_file parameter. Test with controlled input to see if command injection is possible.

Check Version:

# Check Fujian Kelixun version if documented in files
find / -name "*kelixun*" -type f -exec grep -l "version" {} \; 2>/dev/null

Verify Fix Applied:

Verify that input validation prevents command execution by testing with malicious payloads. Ensure fax_view.php is disabled or properly secured.

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in web server logs containing fax_view.php with suspicious fax_file parameters
  • System logs showing unexpected process execution from web server user

Network Indicators:

  • HTTP requests to /app/fax/fax_view.php with shell metacharacters in parameters
  • Outbound connections from web server to unexpected destinations

SIEM Query:

source="web_server_logs" AND uri_path="/app/fax/fax_view.php" AND (param="fax_file" AND value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export