VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 04 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
Title VeeVPN 1.6.1 - Unquoted Service Path Remote Code Execution
Weaknesses CWE-428
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-04T20:46:08.742Z

Reserved: 2025-12-04T16:25:29.546Z

Link: CVE-2025-66575

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-04T21:16:10.413

Modified: 2025-12-04T21:16:10.413

Link: CVE-2025-66575

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses