Логотип exploitDog
bind:CVE-2025-66398
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-66398

Количество 2

Количество 2

nvd логотип

CVE-2025-66398

около 1 месяца назад

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state (`restoreFilePath`) of the server via the `/skServer/validateBackup` endpoint. This allows the attacker to hijack the administrator's "Restore" functionality to overwrite critical server configuration files (e.g., `security.json`, `package.json`), leading to account takeover and Remote Code Execution (RCE). Version 2.19.0 patches this vulnerability.

CVSS3: 9.6
EPSS: Низкий
github логотип

GHSA-w3x5-7c4c-66p9

около 1 месяца назад

Signal K Server has Unauthenticated State Pollution leading to Remote Code Execution (RCE)

CVSS3: 9.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-66398

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state (`restoreFilePath`) of the server via the `/skServer/validateBackup` endpoint. This allows the attacker to hijack the administrator's "Restore" functionality to overwrite critical server configuration files (e.g., `security.json`, `package.json`), leading to account takeover and Remote Code Execution (RCE). Version 2.19.0 patches this vulnerability.

CVSS3: 9.6
0%
Низкий
около 1 месяца назад
github логотип
GHSA-w3x5-7c4c-66p9

Signal K Server has Unauthenticated State Pollution leading to Remote Code Execution (RCE)

CVSS3: 9.6
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу