NetSupport Manager < 14.12.0001 contains an unauthenticated SQL injection vulnerability in its Connectivity Server/Gateway HTTPS request handling. The server evaluates request URIs using an unsanitized SQLite query against the FileLinks table in gateway.db. By injecting SQL through the LinkName/URI value, a remote attacker can control the FileName field used by the server to read and return files from disk, resulting in arbitrary local file disclosure.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 15 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Description NetSupport Manager <= 14.12.0.304 contains an unauthenticated SQL injection vulnerability in its Connectivity Server/Gateway HTTPS request handling. The server evaluates request URIs using an unsanitized SQLite query against the FileLinks table in gateway.db. By injecting SQL through the LinkName/URI value, a remote attacker can control the FileName field used by the server to read and return files from disk, resulting in arbitrary local file disclosure. NetSupport Manager < 14.12.0001 contains an unauthenticated SQL injection vulnerability in its Connectivity Server/Gateway HTTPS request handling. The server evaluates request URIs using an unsanitized SQLite query against the FileLinks table in gateway.db. By injecting SQL through the LinkName/URI value, a remote attacker can control the FileName field used by the server to read and return files from disk, resulting in arbitrary local file disclosure.
Title NetSupport Manager <= 14.12.0.304 Unauthenticated SQLi Local File Disclosure NetSupport Manager < 14.12.0001 Unauthenticated SQLi Local File Disclosure

Mon, 15 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description NetSupport Manager <= 14.12.0.304 contains an unauthenticated SQL injection vulnerability in its Connectivity Server/Gateway HTTPS request handling. The server evaluates request URIs using an unsanitized SQLite query against the FileLinks table in gateway.db. By injecting SQL through the LinkName/URI value, a remote attacker can control the FileName field used by the server to read and return files from disk, resulting in arbitrary local file disclosure.
Title NetSupport Manager <= 14.12.0.304 Unauthenticated SQLi Local File Disclosure
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-15T14:52:50.913Z

Reserved: 2025-04-15T19:15:22.567Z

Link: CVE-2025-34179

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-15T15:15:49.573

Modified: 2025-12-15T15:15:49.573

Link: CVE-2025-34179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses