Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66680: n/a

0
Unknown
VulnerabilityCVE-2025-66680cvecve-2025-66680
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the WiseDelfile64.sys component of WiseCleaner Wise Force Deleter 7.3.2 and earlier allows attackers to delete arbitrary files via a crafted request.

AI-Powered Analysis

AILast updated: 03/03/2026, 16:02:37 UTC

Technical Analysis

CVE-2025-66680 is a security vulnerability identified in the WiseDelfile64.sys kernel-mode driver component of WiseCleaner Wise Force Deleter, specifically version 7.3.2 and earlier. This driver is responsible for handling file deletion requests at a low system level. The vulnerability arises because the driver improperly validates input from user-mode requests, allowing an attacker to craft a malicious request that causes the driver to delete arbitrary files on the system. This can lead to unauthorized deletion of critical system or user files, potentially causing system instability, data loss, or denial of service conditions. The vulnerability does not currently have a CVSS score, and no patches or public exploits have been reported as of the publication date. Exploitation likely requires local access or the ability to send crafted requests to the driver interface, which may be exposed depending on system configuration. The lack of authentication requirements increases the risk if the driver is accessible by unprivileged users or processes. Given the nature of the flaw, it primarily impacts Windows systems running the vulnerable Wise Force Deleter software, which is used for forcibly deleting locked or stubborn files. The vulnerability highlights the risks of kernel-mode drivers improperly validating input, which can lead to critical system-level impacts.

Potential Impact

The primary impact of CVE-2025-66680 is unauthorized deletion of arbitrary files on affected systems. This can result in significant data loss, corruption of system files, and potential denial of service if essential OS files or application data are removed. For organizations, this could disrupt business operations, cause downtime, and lead to costly recovery efforts. In environments where Wise Force Deleter is used to manage locked files, attackers could exploit this vulnerability to bypass normal file protection mechanisms and delete sensitive or critical files. The lack of authentication and potential ease of exploitation increases the risk, especially in multi-user or shared environments. Although no known exploits are currently in the wild, the vulnerability's presence in a kernel-mode driver elevates its severity due to the high privileges involved. Organizations relying on this software in critical infrastructure, enterprise environments, or with sensitive data are particularly at risk of operational disruption and data integrity issues.

Mitigation Recommendations

Organizations should immediately audit their use of Wise Force Deleter software and identify systems running version 7.3.2 or earlier. Until a patch is released, restrict access to the affected driver by limiting user permissions and controlling which processes can interact with WiseDelfile64.sys. Employ application whitelisting and endpoint protection solutions to detect and block suspicious attempts to send crafted requests to the driver. Monitor system logs for unusual file deletion activities and implement file integrity monitoring to quickly detect unauthorized changes. Consider isolating or removing the software from critical systems if feasible. Engage with WiseCleaner support or vendor channels to obtain updates or patches as soon as they become available. Additionally, educate users about the risks of running untrusted software that interacts with system-level drivers. For environments where local access cannot be fully controlled, consider deploying host-based intrusion prevention systems (HIPS) to detect exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a702c6d1a09e29cb555065

Added to database: 3/3/2026, 3:48:22 PM

Last enriched: 3/3/2026, 4:02:37 PM

Last updated: 3/4/2026, 7:15:29 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses