Skip to main content

CVE-2025-5106: OS Command Injection in Fujian Kelixun

Medium
VulnerabilityCVE-2025-5106cvecve-2025-5106
Published: Fri May 23 2025 (05/23/2025, 12:00:09 UTC)
Source: CVE
Vendor/Project: Fujian
Product: Kelixun

Description

A vulnerability was found in Fujian Kelixun 1.0. It has been classified as critical. This affects an unknown part of the file /app/fax/fax_view.php of the component Filename Handler. The manipulation of the argument fax_file leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/08/2025, 04:43:11 UTC

Technical Analysis

CVE-2025-5106 is a critical security vulnerability identified in Fujian Kelixun version 1.0, specifically within the file /app/fax/fax_view.php in the Filename Handler component. The vulnerability arises from improper handling of the 'fax_file' argument, which allows an attacker to perform OS command injection. This means that an attacker can inject arbitrary operating system commands through the vulnerable parameter, which the system then executes with the privileges of the application. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing the risk of exploitation. Although the vendor was notified early, they have not responded or provided a patch, and the exploit details have been publicly disclosed, raising the likelihood of active exploitation attempts. The CVSS 4.0 base score is 6.9, categorizing it as medium severity; however, the nature of OS command injection typically implies a high risk due to potential full system compromise. The vulnerability affects only version 1.0 of the Kelixun product, and no known exploits in the wild have been reported yet. The lack of vendor response and patch availability means organizations must rely on other mitigation strategies until an official fix is released.

Potential Impact

For European organizations using Fujian Kelixun 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized command execution on affected systems, potentially resulting in data breaches, system disruption, or lateral movement within networks. Given that the vulnerability is remotely exploitable without authentication, attackers could compromise fax handling systems, which may be integrated into critical communication or document workflows. This could impact confidentiality, integrity, and availability of sensitive information. Additionally, compromised systems could be leveraged as footholds for further attacks, including ransomware or espionage. The absence of vendor patches increases the window of exposure, and organizations relying on this product must consider the risk of operational disruption and reputational damage. The impact is particularly acute for sectors with stringent data protection requirements under GDPR, as exploitation could lead to regulatory penalties.

Mitigation Recommendations

In the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately isolate or segment the affected Kelixun 1.0 systems from critical network segments to limit exposure. 2) Employ strict input validation and filtering at network perimeter devices or web application firewalls (WAFs) to detect and block suspicious payloads targeting the 'fax_file' parameter. 3) Monitor logs and network traffic for unusual command execution patterns or anomalies related to fax_view.php access. 4) If feasible, disable or restrict access to the fax_view.php component or the fax handling functionality until a patch is available. 5) Conduct an inventory to identify all instances of Fujian Kelixun 1.0 in the environment and prioritize remediation or replacement. 6) Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized command execution. 7) Engage with Fujian or third-party security vendors for potential workarounds or unofficial patches. 8) Prepare incident response plans specific to this vulnerability to enable rapid containment if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-23T06:25:49.278Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683065190acd01a2492721d9

Added to database: 5/23/2025, 12:07:53 PM

Last enriched: 7/8/2025, 4:43:11 AM

Last updated: 7/30/2025, 4:09:26 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats