Cyber Posture

CVE-2025-0798

HighPublic PoC

Published: 29 January 2025

Published
29 January 2025
Modified
09 October 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0144 80.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Security Summary

CVE-2025-0798 is a critical OS command injection vulnerability (CWE-77, CWE-78) in MicroWorld eScan Antivirus version 7.0.32 on Linux systems. The flaw resides in the Quarantine Handler component, specifically during processing of the rtscanner file, where improper handling allows malicious input to execute arbitrary operating system commands. Rated at CVSS 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), it was published on January 29, 2025.

Remote attackers can exploit this vulnerability without privileges or user interaction, though it requires high attack complexity and is considered difficult to execute. Successful exploitation enables full system compromise, granting high-impact confidentiality, integrity, and availability violations through injected OS commands.

Advisories from VulDB and a public GitHub disclosure detail the issue, including a proof-of-concept exploit in escan_rtscanner_rce.md, but the vendor was contacted early and provided no response or patch. Security practitioners should monitor for updates, restrict access to the affected component, and consider alternative antivirus solutions until mitigation is available.

The exploit has been publicly disclosed and may be used, though its high complexity limits widespread adoption. No real-world exploitation in the wild is reported.

Details

CWE(s)
CWE-77CWE-78

Affected Products

escanav
escan anti-virus
7.0.32

MITRE ATT&CK Enterprise Techniques

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

OS command injection in Linux antivirus service rtscanner enables Unix Shell command execution (T1059.004), indirect command execution (T1202 as cited in advisory), and exploitation of remote service for RCE (T1210).

References