CVE-2025-59740

9.8 CRITICAL

📋 TL;DR

This is a critical command injection vulnerability in AndSoft's e-TMS transportation management software that allows unauthenticated attackers to execute arbitrary operating system commands on the server by sending a specially crafted POST request. All organizations using the vulnerable version of e-TMS are affected, potentially exposing their entire server infrastructure to compromise.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows Server (likely)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of e-TMS v25.03. The software is typically deployed on Windows Server environments for transportation management operations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover leading to data theft, ransomware deployment, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Initial foothold on the server leading to credential harvesting, data exfiltration, and deployment of cryptocurrency miners or botnet malware.

🟢

If Mitigated

Limited impact due to network segmentation, application firewalls, and proper access controls preventing command execution or lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and exploitation is straightforward via POST request manipulation. Given the high CVSS score and command injection nature, weaponization is highly likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as specified in vendor advisory

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: Yes

Instructions:

1. Contact AndSoft for the latest patched version. 2. Backup current installation and data. 3. Apply the vendor-provided patch or upgrade to the fixed version. 4. Restart the e-TMS service and verify functionality.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests containing command injection patterns targeting the vulnerable parameter

WAF specific - configure rule to block POST requests to /clt/LOGINFRM_CAT.ASP with suspicious 'm' parameter values

Network Access Control

all

Restrict access to the e-TMS application to trusted IP addresses only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="APP_PORT" accept'
netsh advfirewall firewall add rule name="e-TMS Access" dir=in action=allow protocol=TCP localport=APP_PORT remoteip=TRUSTED_IP

🧯 If You Can't Patch

  • Immediately isolate the e-TMS server from the internet and restrict internal network access to only necessary systems
  • Implement strict monitoring and alerting for any suspicious command execution or unusual POST requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test by sending a POST request to /clt/LOGINFRM_CAT.ASP with a command injection payload in the 'm' parameter and observing server response

Check Version:

Check the e-TMS application version through the admin interface or application files

Verify Fix Applied:

Attempt the same command injection test after patching - it should return an error or sanitized response rather than executing commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /clt/LOGINFRM_CAT.ASP
  • Suspicious command strings in web server logs (cmd.exe, powershell, bash, etc.)
  • Unexpected process execution from web server context

Network Indicators:

  • POST requests to vulnerable endpoint with command injection patterns
  • Outbound connections from web server to unusual destinations

SIEM Query:

source="web_server" AND (url="/clt/LOGINFRM_CAT.ASP" AND method="POST") AND (param="m" AND value MATCHES "[|;&$()]" OR value CONTAINS "cmd" OR "powershell" OR "bash")

🔗 References

📤 Share & Export