Skip to main content

CVE-2025-5176: SQL Injection in Realce Tecnologia Queue Ticket Kiosk

Medium
VulnerabilityCVE-2025-5176cvecve-2025-5176
Published: Mon May 26 2025 (05/26/2025, 08:00:10 UTC)
Source: CVE
Vendor/Project: Realce Tecnologia
Product: Queue Ticket Kiosk

Description

A vulnerability was found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. It has been declared as critical. This vulnerability affects unknown code of the file /adm/index.php of the component Admin Login Page. The manipulation of the argument Usuário leads to sql injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:54:54 UTC

Technical Analysis

CVE-2025-5176 is a critical SQL Injection vulnerability identified in the Realce Tecnologia Queue Ticket Kiosk product, specifically affecting versions up to 20250517. The vulnerability resides in the Admin Login Page component, within the /adm/index.php file. The flaw is triggered by manipulation of the 'Usuário' parameter, which is insufficiently sanitized, allowing an attacker to inject malicious SQL commands. This injection can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the backend database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt service operations. Despite the critical nature of the flaw, the vendor has not responded to disclosure attempts, and no patches or mitigations have been published. No known exploits are currently reported in the wild, but the ease of exploitation and lack of vendor response increase the risk of future exploitation. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the vulnerability's significant impact but limited scope due to the specific affected component and product. The Queue Ticket Kiosk is typically used in environments managing customer queues and ticketing, making the integrity and availability of the system crucial for operational continuity.

Potential Impact

For European organizations using the Realce Tecnologia Queue Ticket Kiosk, this vulnerability poses a substantial risk. The SQL Injection could lead to unauthorized access to sensitive customer data, including personally identifiable information (PII), which would have serious implications under the EU's GDPR regulations, potentially resulting in heavy fines and reputational damage. Operational disruption caused by data manipulation or denial of service could affect service delivery in public-facing environments such as government offices, healthcare facilities, or transportation hubs where queue management systems are critical. The ability to exploit this vulnerability remotely without authentication increases the attack surface, making it easier for threat actors to target these systems. Additionally, compromised kiosks could be leveraged as pivot points for lateral movement within organizational networks, escalating the overall risk posture. The lack of vendor response and absence of patches further exacerbate the threat, leaving organizations exposed until mitigations are implemented independently.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include deploying web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'Usuário' parameter in the /adm/index.php endpoint. Network segmentation should isolate the Queue Ticket Kiosk systems from critical backend infrastructure to limit potential lateral movement. Organizations should conduct thorough input validation and sanitization at the application level if they have the capability to modify the source code or request vendor support. Regular monitoring of logs for suspicious SQL queries or unusual access patterns is essential to detect exploitation attempts early. Restricting access to the admin interface by IP whitelisting or VPN-only access can reduce exposure. Additionally, organizations should prepare incident response plans tailored to potential data breaches stemming from this vulnerability. Finally, maintaining up-to-date backups of the database and system configurations will aid in recovery if an attack occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-25T17:14:23.635Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683424ac0acd01a2492846a3

Added to database: 5/26/2025, 8:22:04 AM

Last enriched: 7/9/2025, 1:54:54 PM

Last updated: 8/15/2025, 5:48:27 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats