OS Command Injection Vulnerability in Blue Angel Software Suite on Embedded Linux Devices
CVE-2025-34033

7.7HIGH

Key Information:

Vendor
CVE Published:
24 June 2025

Badges

👾 Exploit Exists

What is CVE-2025-34033?

An OS command injection vulnerability has been identified in the Blue Angel Software Suite, a solution utilized within embedded Linux devices. This flaw arises from inadequate input sanitization of the ping_addr parameter in the webctrl.cgi script. Authenticated attackers can exploit this by submitting malicious GET requests with specially crafted parameters, allowing them to execute arbitrary system commands. The results of these commands are reflected in the application’s web interface, offering attackers visibility and interaction with the system. The vulnerability can be further exploited through the use of default or backdoor credentials, enabling comprehensive command execution as root.

Affected Version(s)

Blue Angel Software Suite 0

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Paolo Serracino
Pietro Minniti
Damiano Proietti
.
CVE-2025-34033 : OS Command Injection Vulnerability in Blue Angel Software Suite on Embedded Linux Devices