Cyber Posture

CVE-2025-57457

High

Published: 08 October 2025

Published
08 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 38.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.

Security Summary

CVE-2025-57457 is an OS command injection vulnerability (CWE-78) in the Admin panel of Curo UC300 version 5.42.1.7.1.63R1. The issue allows local attackers to inject arbitrary OS commands through the "IP Addr" parameter. Published on 2025-10-08, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impact.

An attacker with low privileges can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants the ability to execute arbitrary OS commands on the affected system, resulting in high impacts to confidentiality, integrity, and availability.

Vendor advisories and further details, including potential patches or mitigation guidance, are referenced at http://curo.com and https://github.com/restdone/CVE-2025-57457/tree/main.

Details

CWE(s)
CWE-78

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

OS command injection in a network-accessible admin panel enables exploitation of public-facing applications (T1190) and arbitrary command execution via command interpreters (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References