CVE-2025-57457
📋 TL;DR
This CVE describes an OS command injection vulnerability in the Curo UC300 admin panel where local attackers can execute arbitrary operating system commands via the 'IP Addr' parameter. This allows attackers to potentially gain full control of affected systems. The vulnerability affects Curo UC300 version 5.42.1.7.1.63R1 and requires local access to exploit.
💻 Affected Systems
- Curo UC300
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root/administrator privileges, data exfiltration, lateral movement to other systems, and persistent backdoor installation.
Likely Case
Local privilege escalation leading to unauthorized administrative access, system configuration changes, and potential data access.
If Mitigated
Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation.
🎯 Exploit Status
Proof of concept available on GitHub. Exploitation requires local access to the admin panel but not necessarily authentication (depends on admin panel access controls).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://curo.com
Restart Required: No
Instructions:
1. Check vendor website for security updates. 2. Apply any available patches from Curo. 3. Verify the fix by testing the IP Addr parameter.
🔧 Temporary Workarounds
Restrict Admin Panel Access
allLimit access to the admin panel to trusted IP addresses only
Input Validation
allImplement strict input validation on the IP Addr parameter to reject any non-IP characters
🧯 If You Can't Patch
- Implement network segmentation to isolate Curo UC300 systems from critical infrastructure
- Enable detailed logging and monitoring of admin panel access and command execution attempts
🔍 How to Verify
Check if Vulnerable:
Test the IP Addr parameter in the admin panel with command injection payloads like '127.0.0.1; whoami' and observe if commands execute.
Check Version:
Check system version through admin panel interface or system information page
Verify Fix Applied:
After applying vendor patches, retest with command injection payloads to confirm they are properly sanitized and rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed login attempts to admin panel
- Suspicious characters in IP address fields
Network Indicators:
- Unexpected outbound connections from Curo UC300 systems
- Unusual traffic patterns to/from admin panel
SIEM Query:
source="curo_uc300" AND (event="command_execution" OR message="*;*" OR message="*|*" OR message="*`*" OR message="*$(*")