OS Command Injection in BDCOM Behavior Management and Auditing System
CVE-2025-1546

6.9MEDIUM

Key Information:

Vendor
Bdcom
Status
Behavior Management And Auditing System
Vendor
CVE Published:
21 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability exists in the BDCOM Behavior Management and Auditing System, specifically in the log_operate_clear function located in /webui/modules/log/operate.mds. This issue arises due to improper handling of user-supplied arguments, notably the start_code parameter, which can be exploited to execute arbitrary OS commands. The vulnerability allows for remote attacks, making it a significant risk. Despite the vendor being informed about this vulnerability, no response was received, making it imperative for users to take immediate action to mitigate the risks associated with this security flaw.

Affected Version(s)

Behavior Management and Auditing System 20250210

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

KOISH1 (VulDB User)
.