CVE-2025-5106: OS Command Injection in Fujian Kelixun
A vulnerability was found in Fujian Kelixun 1.0. It has been classified as critical. This affects an unknown part of the file /app/fax/fax_view.php of the component Filename Handler. The manipulation of the argument fax_file leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5106 is a critical security vulnerability identified in Fujian Kelixun version 1.0, specifically within the file /app/fax/fax_view.php in the Filename Handler component. The vulnerability arises from improper handling of the 'fax_file' argument, which allows an attacker to perform OS command injection. This means that an attacker can inject arbitrary operating system commands through the vulnerable parameter, which the system then executes with the privileges of the application. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing the risk of exploitation. Although the vendor was notified early, they have not responded or provided a patch, and the exploit details have been publicly disclosed, raising the likelihood of active exploitation attempts. The CVSS 4.0 base score is 6.9, categorizing it as medium severity; however, the nature of OS command injection typically implies a high risk due to potential full system compromise. The vulnerability affects only version 1.0 of the Kelixun product, and no known exploits in the wild have been reported yet. The lack of vendor response and patch availability means organizations must rely on other mitigation strategies until an official fix is released.
Potential Impact
For European organizations using Fujian Kelixun 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized command execution on affected systems, potentially resulting in data breaches, system disruption, or lateral movement within networks. Given that the vulnerability is remotely exploitable without authentication, attackers could compromise fax handling systems, which may be integrated into critical communication or document workflows. This could impact confidentiality, integrity, and availability of sensitive information. Additionally, compromised systems could be leveraged as footholds for further attacks, including ransomware or espionage. The absence of vendor patches increases the window of exposure, and organizations relying on this product must consider the risk of operational disruption and reputational damage. The impact is particularly acute for sectors with stringent data protection requirements under GDPR, as exploitation could lead to regulatory penalties.
Mitigation Recommendations
In the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately isolate or segment the affected Kelixun 1.0 systems from critical network segments to limit exposure. 2) Employ strict input validation and filtering at network perimeter devices or web application firewalls (WAFs) to detect and block suspicious payloads targeting the 'fax_file' parameter. 3) Monitor logs and network traffic for unusual command execution patterns or anomalies related to fax_view.php access. 4) If feasible, disable or restrict access to the fax_view.php component or the fax handling functionality until a patch is available. 5) Conduct an inventory to identify all instances of Fujian Kelixun 1.0 in the environment and prioritize remediation or replacement. 6) Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized command execution. 7) Engage with Fujian or third-party security vendors for potential workarounds or unofficial patches. 8) Prepare incident response plans specific to this vulnerability to enable rapid containment if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5106: OS Command Injection in Fujian Kelixun
Description
A vulnerability was found in Fujian Kelixun 1.0. It has been classified as critical. This affects an unknown part of the file /app/fax/fax_view.php of the component Filename Handler. The manipulation of the argument fax_file leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5106 is a critical security vulnerability identified in Fujian Kelixun version 1.0, specifically within the file /app/fax/fax_view.php in the Filename Handler component. The vulnerability arises from improper handling of the 'fax_file' argument, which allows an attacker to perform OS command injection. This means that an attacker can inject arbitrary operating system commands through the vulnerable parameter, which the system then executes with the privileges of the application. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing the risk of exploitation. Although the vendor was notified early, they have not responded or provided a patch, and the exploit details have been publicly disclosed, raising the likelihood of active exploitation attempts. The CVSS 4.0 base score is 6.9, categorizing it as medium severity; however, the nature of OS command injection typically implies a high risk due to potential full system compromise. The vulnerability affects only version 1.0 of the Kelixun product, and no known exploits in the wild have been reported yet. The lack of vendor response and patch availability means organizations must rely on other mitigation strategies until an official fix is released.
Potential Impact
For European organizations using Fujian Kelixun 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized command execution on affected systems, potentially resulting in data breaches, system disruption, or lateral movement within networks. Given that the vulnerability is remotely exploitable without authentication, attackers could compromise fax handling systems, which may be integrated into critical communication or document workflows. This could impact confidentiality, integrity, and availability of sensitive information. Additionally, compromised systems could be leveraged as footholds for further attacks, including ransomware or espionage. The absence of vendor patches increases the window of exposure, and organizations relying on this product must consider the risk of operational disruption and reputational damage. The impact is particularly acute for sectors with stringent data protection requirements under GDPR, as exploitation could lead to regulatory penalties.
Mitigation Recommendations
In the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately isolate or segment the affected Kelixun 1.0 systems from critical network segments to limit exposure. 2) Employ strict input validation and filtering at network perimeter devices or web application firewalls (WAFs) to detect and block suspicious payloads targeting the 'fax_file' parameter. 3) Monitor logs and network traffic for unusual command execution patterns or anomalies related to fax_view.php access. 4) If feasible, disable or restrict access to the fax_view.php component or the fax handling functionality until a patch is available. 5) Conduct an inventory to identify all instances of Fujian Kelixun 1.0 in the environment and prioritize remediation or replacement. 6) Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized command execution. 7) Engage with Fujian or third-party security vendors for potential workarounds or unofficial patches. 8) Prepare incident response plans specific to this vulnerability to enable rapid containment if exploitation is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-23T06:25:49.278Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683065190acd01a2492721d9
Added to database: 5/23/2025, 12:07:53 PM
Last enriched: 7/8/2025, 4:43:11 AM
Last updated: 7/30/2025, 4:09:26 PM
Views: 12
Related Threats
CVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalCVE-2025-43982: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.