CVE-2025-57457

8.8 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in the Curo UC300 admin panel where local attackers can execute arbitrary operating system commands via the 'IP Addr' parameter. This allows attackers to potentially gain full control of affected systems. The vulnerability affects Curo UC300 version 5.42.1.7.1.63R1 and requires local access to exploit.

💻 Affected Systems

Products:
  • Curo UC300
Versions: 5.42.1.7.1.63R1
Operating Systems: Unknown - Likely embedded Linux-based system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the admin panel interface. The specific operating system is not specified in the CVE description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root/administrator privileges, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized administrative access, system configuration changes, and potential data access.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: LOW - The vulnerability requires local access to the admin panel, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Local attackers with access to the admin interface can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept available on GitHub. Exploitation requires local access to the admin panel but not necessarily authentication (depends on admin panel access controls).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://curo.com

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply any available patches from Curo. 3. Verify the fix by testing the IP Addr parameter.

🔧 Temporary Workarounds

Restrict Admin Panel Access

all

Limit access to the admin panel to trusted IP addresses only

Input Validation

all

Implement strict input validation on the IP Addr parameter to reject any non-IP characters

🧯 If You Can't Patch

  • Implement network segmentation to isolate Curo UC300 systems from critical infrastructure
  • Enable detailed logging and monitoring of admin panel access and command execution attempts

🔍 How to Verify

Check if Vulnerable:

Test the IP Addr parameter in the admin panel with command injection payloads like '127.0.0.1; whoami' and observe if commands execute.

Check Version:

Check system version through admin panel interface or system information page

Verify Fix Applied:

After applying vendor patches, retest with command injection payloads to confirm they are properly sanitized and rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts to admin panel
  • Suspicious characters in IP address fields

Network Indicators:

  • Unexpected outbound connections from Curo UC300 systems
  • Unusual traffic patterns to/from admin panel

SIEM Query:

source="curo_uc300" AND (event="command_execution" OR message="*;*" OR message="*|*" OR message="*`*" OR message="*$(*")

🔗 References

📤 Share & Export