CVE-2025-5176

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Realce Tecnologia Queue Ticket Kiosk allows remote attackers to execute arbitrary SQL commands through the admin login page. Attackers can potentially bypass authentication, access sensitive data, or take control of affected systems. Organizations using this kiosk software up to version 20250517 are at risk.

💻 Affected Systems

Products:
  • Realce Tecnologia Queue Ticket Kiosk
Versions: Up to and including 20250517
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin login page specifically at /adm/index.php. All deployments with this component exposed are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to steal all database contents, execute arbitrary commands, and potentially pivot to other systems in the network.

🟠

Likely Case

Authentication bypass leading to unauthorized admin access, data exfiltration of sensitive queue/ticket information, and potential manipulation of kiosk operations.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF protection, and database permissions restricting damage to the kiosk application only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The vulnerability is in the login page, making it accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Contact vendor for updates or consider alternative solutions.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block exploitation attempts

Network Segmentation

linux

Restrict access to the admin interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

🧯 If You Can't Patch

  • Isolate the kiosk system on a separate network segment with no access to sensitive systems
  • Implement strict input validation and parameterized queries if source code modification is possible

🔍 How to Verify

Check if Vulnerable:

Check if /adm/index.php exists and accepts user input in the login form. Test with SQL injection payloads like ' OR '1'='1

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection payloads no longer work and that input is properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in login attempts
  • Multiple failed login attempts with SQL keywords
  • Admin access from unexpected IP addresses

Network Indicators:

  • HTTP requests to /adm/index.php containing SQL keywords like UNION, SELECT, OR

SIEM Query:

source="web_logs" AND uri="/adm/index.php" AND (request CONTAINS "UNION" OR request CONTAINS "SELECT" OR request CONTAINS "OR '1'='1'")

🔗 References

📤 Share & Export