CVE-2025-61937
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
The vulnerability, if exploited, could allow an unauthenticated miscreant to achieve remote code execution under OS system privileges of “taoimr” service, potentially resulting in complete compromise of the model application server.
Analysis
A CVSS 10.0 code injection vulnerability allows unauthenticated attackers to achieve remote code execution with OS-level system privileges on the affected product.
Technical Context
This CWE-94 code injection vulnerability allows unauthenticated network-based attackers to inject and execute arbitrary code that runs with operating system system-level privileges, providing complete control over the target.
Affected Products
['Affected product (details pending vendor disclosure)']
Remediation
Apply vendor patches immediately. If no patch is available, restrict network access to the vulnerable service and implement WAF rules.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today