Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54945: CWE-73: External Control of File Name or Path in SUNNET Technology Co., Ltd. Corporate Training Management System

0
Critical
VulnerabilityCVE-2025-54945cvecve-2025-54945cwe-73
Published: Sat Aug 30 2025 (08/30/2025, 03:50:54 UTC)
Source: CVE Database V5
Vendor/Project: SUNNET Technology Co., Ltd.
Product: Corporate Training Management System

Description

An external control of file name or path vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to execute arbitrary system commands via a malicious file by controlling the destination file path.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:34:43 UTC

Technical Analysis

CVE-2025-54945 is a critical vulnerability classified under CWE-73 (External Control of File Name or Path) affecting SUNNET Technology Co., Ltd.'s Corporate Training Management System versions prior to 10.11. This vulnerability allows remote attackers to execute arbitrary system commands by manipulating the destination file path through a maliciously crafted file. Essentially, the application fails to properly validate or sanitize user-controlled input that determines file paths, enabling attackers to control where files are written or executed on the system. This can lead to arbitrary code execution without requiring any authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as attackers can execute system commands remotely, potentially leading to full system compromise. No patches are currently linked, and no known exploits are reported in the wild yet, but the CVSS score of 10 reflects the maximum severity and ease of exploitation. The vulnerability affects all versions before 10.11, with the affectedVersions field indicating '0', likely meaning all prior versions. The vulnerability was published on August 30, 2025, and assigned by ZUSO ART. The lack of required privileges and user interaction makes this vulnerability particularly dangerous in environments where the Corporate Training Management System is exposed to untrusted networks or users.

Potential Impact

For European organizations using SUNNET's Corporate Training Management System, this vulnerability poses a significant risk. The ability for remote attackers to execute arbitrary system commands can lead to data breaches, unauthorized access to sensitive corporate training materials, disruption of training operations, and potential lateral movement within the network. Given that training systems often contain employee data and organizational knowledge, confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties. Integrity of training content and system configurations could be compromised, undermining organizational security awareness efforts. Availability could also be impacted if attackers deploy ransomware or disrupt system functionality. The critical severity and unauthenticated remote exploitation capability mean that organizations with internet-facing or poorly segmented deployments are at high risk. Additionally, the absence of known exploits currently does not reduce the urgency, as weaponization could occur rapidly once the vulnerability becomes widely known.

Mitigation Recommendations

Immediate mitigation steps include isolating the Corporate Training Management System from public networks or restricting access via network segmentation and firewalls to trusted users only. Organizations should monitor network traffic and system logs for unusual file path manipulations or command execution attempts. Since no official patches are currently linked, organizations should contact SUNNET Technology Co., Ltd. for updates or apply any available vendor advisories promptly. As a temporary workaround, administrators can implement strict input validation and sanitization on file path parameters if customization is possible. Employing application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious file path traversal or command injection patterns can reduce risk. Regular backups and incident response plans should be reviewed and tested to prepare for potential exploitation. Finally, organizations should inventory affected systems and prioritize remediation based on exposure and criticality.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ZUSO ART
Date Reserved
2025-08-01T07:35:26.454Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b277e9ad5a09ad007e9acc

Added to database: 8/30/2025, 4:02:49 AM

Last enriched: 9/7/2025, 12:34:43 AM

Last updated: 10/14/2025, 11:46:34 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats