Insufficient Data Authenticity in Eluktronics Control Center Affects Local Systems
CVE-2025-7884
Key Information:
- Vendor
Eluktronics
- Status
- Vendor
- CVE Published:
- 20 July 2025
Badges
What is CVE-2025-7884?
A vulnerability within Eluktronics Control Center, specifically in the REG File Handler component, allows for inadequate verification of data authenticity. This flaw potentially exposes local systems to manipulation. Attackers could exploit this weakness to gain unauthorized access or execute malicious operations. Despite early disclosure to the vendor, there has been no response or remediation efforts reported, making it crucial for users to assess their systems' vulnerability to this issue.
Affected Version(s)
Control Center 5.23.51.41
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved