CVE-2025-5525

5.6 MEDIUM

📋 TL;DR

CVE-2025-5525 is a critical command injection vulnerability in Jrohy trojan versions up to 2.15.3. Attackers can execute arbitrary operating system commands remotely by manipulating the LogChan function's argument. This affects all users running vulnerable versions of Jrohy trojan.

💻 Affected Systems

Products:
  • Jrohy trojan
Versions: Up to and including 2.15.3
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the trojan/util/linux.go file and affects the LogChan function. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, install additional malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to backdoor installation, data theft, or cryptocurrency mining malware deployment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place to detect and contain exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Public proof-of-concept code exists, and exploitation can be initiated remotely without authentication, though the complexity is rated as medium.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch is available. Consider removing Jrohy trojan from affected systems or implementing workarounds.

🔧 Temporary Workarounds

Remove Jrohy trojan

linux

Uninstall Jrohy trojan from affected systems to eliminate the vulnerability.

sudo systemctl stop jrohy-trojan
sudo apt remove jrohy-trojan || sudo yum remove jrohy-trojan

Network isolation

linux

Restrict network access to Jrohy trojan instances using firewall rules.

sudo iptables -A INPUT -p tcp --dport [JROHY_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Deploy endpoint detection and response (EDR) tools to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check the Jrohy trojan version. If it is 2.15.3 or earlier, the system is vulnerable.

Check Version:

jrohy-trojan --version || dpkg -l | grep jrohy-trojan || rpm -qa | grep jrohy-trojan

Verify Fix Applied:

Verify that Jrohy trojan has been removed or updated to a version above 2.15.3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Suspicious process creation from Jrohy trojan

Network Indicators:

  • Unexpected outbound connections from Jrohy trojan instances
  • Anomalous traffic patterns to/from trojan ports

SIEM Query:

process_name:"jrohy-trojan" AND (event_type:"process_creation" OR cmdline:*sh*)

🔗 References

📤 Share & Export