CVE-2025-5525
📋 TL;DR
CVE-2025-5525 is a critical command injection vulnerability in Jrohy trojan versions up to 2.15.3. Attackers can execute arbitrary operating system commands remotely by manipulating the LogChan function's argument. This affects all users running vulnerable versions of Jrohy trojan.
💻 Affected Systems
- Jrohy trojan
📦 What is this software?
Trojan by Jrohy
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary commands, install additional malware, exfiltrate data, or pivot to other systems.
Likely Case
Remote code execution leading to backdoor installation, data theft, or cryptocurrency mining malware deployment.
If Mitigated
Limited impact if proper network segmentation, least privilege, and monitoring are in place to detect and contain exploitation attempts.
🎯 Exploit Status
Public proof-of-concept code exists, and exploitation can be initiated remotely without authentication, though the complexity is rated as medium.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch is available. Consider removing Jrohy trojan from affected systems or implementing workarounds.
🔧 Temporary Workarounds
Remove Jrohy trojan
linuxUninstall Jrohy trojan from affected systems to eliminate the vulnerability.
sudo systemctl stop jrohy-trojan
sudo apt remove jrohy-trojan || sudo yum remove jrohy-trojan
Network isolation
linuxRestrict network access to Jrohy trojan instances using firewall rules.
sudo iptables -A INPUT -p tcp --dport [JROHY_PORT] -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected systems
- Deploy endpoint detection and response (EDR) tools to monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check the Jrohy trojan version. If it is 2.15.3 or earlier, the system is vulnerable.
Check Version:
jrohy-trojan --version || dpkg -l | grep jrohy-trojan || rpm -qa | grep jrohy-trojan
Verify Fix Applied:
Verify that Jrohy trojan has been removed or updated to a version above 2.15.3.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Suspicious process creation from Jrohy trojan
Network Indicators:
- Unexpected outbound connections from Jrohy trojan instances
- Anomalous traffic patterns to/from trojan ports
SIEM Query:
process_name:"jrohy-trojan" AND (event_type:"process_creation" OR cmdline:*sh*)
🔗 References
- https://github.com/Tritium0041/Jrohy-trojan-RCE-POC/blob/main/POC.py
- https://github.com/ainrm/Jrohy-trojan-unauth-poc/blob/main/README.en.md
- https://vuldb.com/?ctiid.310966
- https://vuldb.com/?id.310966
- https://vuldb.com/?submit.586673
- https://github.com/ainrm/Jrohy-trojan-unauth-poc/blob/main/README.en.md