- Description
- A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.
- Source
- psirt@bosch.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@bosch.com
- CWE-78
- Hype score
- Not currently trending
CVE-2025-24351 (CVSS:8.8, HIGH) is Awaiting Analysis. A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (..https://t.co/HqBlTIf2op #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
5 May 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Heads up, security pros! CVE-2025-24351 poses a serious threat! A flaw in ctrlX OS's "Remote Logging" allows low-privilege users to execute root commands with crafted HTTP requests. 🖥️🛡️ Patch now to prevent potential exploits in the wild! ⏰ #CyberSecurity #Patch
@SecAideInfo
3 May 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-24351 A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary … https://t.co/YmqmZhl06f
@CVEnew
30 Apr 2025
266 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-24351: HIGH] Attention: Cyber security alert! Vulnerability in ctrlX OS web app allows remote attacker to execute commands as "root." Update required to prevent exploitation.#cve,CVE-2025-24351,#cybersecurity https://t.co/EhiHiN7AAn https://t.co/uzH8r64wRr
@CveFindCom
30 Apr 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes