An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices.
Metrics
Affected Vendors & Products
Fixes
Solution
These vulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. Customers are strongly encouraged to upgrade by downloading software version 3.1.0.1 at the Vitogate 300 website.
Workaround
No workaround given by the vendor.
References
History
Tue, 23 Sep 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices. | |
Title | Viessmann Vitogate 300 OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2025-09-23T01:12:17.459Z
Reserved: 2025-08-26T17:40:54.110Z
Link: CVE-2025-9494

No data.

Status : Received
Published: 2025-09-23T02:15:47.410
Modified: 2025-09-23T02:15:47.410
Link: CVE-2025-9494

No data.

No data.