Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 16 Dec 2025 06:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netsupport
Netsupport netsupport Manager |
|
| Vendors & Products |
Netsupport
Netsupport netsupport Manager |
Tue, 16 Dec 2025 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 03:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 16 Dec 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NetSupport Manager <= 14.12.0.304 contains an arbitrary file write vulnerability in its Connectivity Server/Gateway PUTFILE request handler. An attacker with a valid Gateway Key can supply a crafted filename containing directory traversal sequences to write files to arbitrary locations on the server. This can be leveraged to place attacker-controlled DLLs or executables in privileged paths and achieve remote code execution in the context of the NetSupport Manager connectivity service. | NetSupport Manager < 14.12.0001 contains an arbitrary file write vulnerability in its Connectivity Server/Gateway PUTFILE request handler. An attacker with a valid Gateway Key can supply a crafted filename containing directory traversal sequences to write files to arbitrary locations on the server. This can be leveraged to place attacker-controlled DLLs or executables in privileged paths and achieve remote code execution in the context of the NetSupport Manager connectivity service. |
| Title | NetSupport Manager <= 14.12.0.304 Authenticated Path Traversal Arbitrary File Write RCE | NetSupport Manager < 14.12.0001 Authenticated Path Traversal Arbitrary File Write RCE |
Tue, 16 Dec 2025 00:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NetSupport Manager <= 14.12.0.304 contains an arbitrary file write vulnerability in its Connectivity Server/Gateway PUTFILE request handler. An attacker with a valid Gateway Key can supply a crafted filename containing directory traversal sequences to write files to arbitrary locations on the server. This can be leveraged to place attacker-controlled DLLs or executables in privileged paths and achieve remote code execution in the context of the NetSupport Manager connectivity service. | |
| Title | NetSupport Manager <= 14.12.0.304 Authenticated Path Traversal Arbitrary File Write RCE | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-15T19:24:16.084Z
Reserved: 2025-04-15T19:15:22.568Z
Link: CVE-2025-34181
Updated: 2025-12-15T19:23:58.845Z
Status : Awaiting Analysis
Published: 2025-12-15T15:15:49.863
Modified: 2025-12-15T19:16:04.580
Link: CVE-2025-34181
No data.
OpenCVE Enrichment
Updated: 2025-12-16T06:33:36Z