Cyber Posture

CVE-2025-1536

High

Published: 21 February 2025

Published
21 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0043 62.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Security Summary

CVE-2025-1536 is a critical OS command injection vulnerability (CWE-77, CWE-78) in Raisecom Multi-Service Intelligent Gateway versions up to 20250208. It affects unknown code in the file /vpn/vpn_template_style.php within the Request Parameter Handler component, where manipulation of the stylenum argument enables command injection.

The vulnerability is exploitable remotely by unauthenticated attackers with low complexity (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, score 7.3). Successful exploitation allows limited impacts on confidentiality, integrity, and availability through arbitrary OS command execution.

VulDB advisories detail the issue and note that the exploit has been publicly disclosed on GitHub, where it may be actively used. The vendor was contacted early regarding disclosure but provided no response, and no patches or specific mitigations are mentioned in available references.

Details

CWE(s)
CWE-77CWE-78

References