Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30434 | An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices. |
Solution
These vulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. Customers are strongly encouraged to upgrade by downloading software version 3.1.0.1 at the Vitogate 300 website.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Viessmann
Viessmann vitogate 300 |
|
| Vendors & Products |
Viessmann
Viessmann vitogate 300 |
Tue, 23 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Sep 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices. | |
| Title | Viessmann Vitogate 300 OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2025-09-23T13:34:06.974Z
Reserved: 2025-08-26T17:40:54.110Z
Link: CVE-2025-9494
Updated: 2025-09-23T13:34:04.246Z
Status : Awaiting Analysis
Published: 2025-09-23T02:15:47.410
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-9494
No data.
OpenCVE Enrichment
Updated: 2025-09-23T16:03:25Z
EUVD