Cyber Posture

CVE-2025-59741

Critical

Published: 02 October 2025

Published
02 October 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0029 51.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse the Windows command shell for execution.

Security Summary

CVE-2025-59741 is an operating system command injection vulnerability (CWE-77, CWE-78) affecting AndSoft's e-TMS version 25.03. The flaw resides in the handling of the 'm' parameter within the '/CLT/LOGINERRORFRM.ASP' endpoint, where unsanitized input from a POST request enables arbitrary command execution on the server. Assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it represents critical risk due to its high impact on confidentiality, integrity, and availability.

The vulnerability can be exploited remotely over the network by unauthenticated attackers with no privileges or user interaction required. By crafting a malicious POST request to the affected endpoint, an attacker can inject and execute arbitrary operating system commands on the server, potentially leading to full system compromise, data exfiltration, persistence, or further lateral movement within the environment.

INCIBE-CERT has issued an advisory detailing multiple vulnerabilities in AndSoft's e-TMS, including this one, under notice "update-24092025-multiple-vulnerabilities-andsofts-e-tms," recommending updates to mitigate the risks. Security practitioners should verify patch availability from the vendor and apply them promptly, alongside input validation and network segmentation as interim controls.

Details

CWE(s)
CWE-77CWE-78

Affected Products

andsoft
e-tms
25.03

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.003 Windows Command Shell Execution
Adversaries may abuse the Windows command shell for execution.
Why these techniques?

Unauthenticated remote command injection in a public-facing ASP web endpoint enables exploitation of public-facing applications (T1190) and arbitrary Windows command execution (T1059.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References