Cyber Posture

CVE-2025-15389

High

Published: 31 December 2025

Published
31 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 35.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

VPN Firewall developed by QNO Technology has an OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs to directly prevent OS command injection attacks like CVE-2025-15389.

prevent

SI-2 mandates timely identification, reporting, and correction of flaws, directly mitigating this specific command injection vulnerability through patching.

prevent

AC-6 enforces least privilege, limiting the impact of arbitrary OS commands executed by low-privileged authenticated attackers exploiting the vulnerability.

Security SummaryAI

CVE-2025-15389 is an OS Command Injection vulnerability (CWE-78) affecting the VPN Firewall developed by QNO Technology. Published on 2025-12-31, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.

Authenticated remote attackers with low privileges can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows them to inject and execute arbitrary OS commands on the affected server, potentially leading to full system compromise.

Mitigation details are provided in advisories from TWCERT/CC, available at https://www.twcert.org.tw/en/cp-139-10614-dee41-2.html and https://www.twcert.org.tw/tw/cp-132-10613-e1780-1.html.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is an OS command injection in a network-accessible VPN Firewall, enabling remote exploitation of a public-facing application (T1190) and arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References