CVE-2025-1536
Published: 21 February 2025
Summary
CVE-2025-1536 is a high-severity Command Injection (CWE-77) vulnerability. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 37.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires information input validation at entry points like the stylenum parameter in /vpn/vpn_template_style.php, directly preventing OS command injection exploitation.
SI-2 mandates timely flaw remediation, including patching or compensating controls for this known critical command injection vulnerability in the Request Parameter Handler.
SI-9 enforces restrictions on information inputs to the vulnerable component, limiting the stylenum argument to safe types and formats to block injection payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in a public-facing web component directly enables remote exploitation of an internet-facing application (T1190) leading to arbitrary command execution via a command interpreter (T1059).
NVD Description
A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads…
more
to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-1536 is a critical OS command injection vulnerability (CWE-77, CWE-78) in Raisecom Multi-Service Intelligent Gateway versions up to 20250208. It affects unknown code in the file /vpn/vpn_template_style.php within the Request Parameter Handler component, where manipulation of the stylenum argument enables command injection.
The vulnerability is exploitable remotely by unauthenticated attackers with low complexity (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, score 7.3). Successful exploitation allows limited impacts on confidentiality, integrity, and availability through arbitrary OS command execution.
VulDB advisories detail the issue and note that the exploit has been publicly disclosed on GitHub, where it may be actively used. The vendor was contacted early regarding disclosure but provided no response, and no patches or specific mitigations are mentioned in available references.
Details
- CWE(s)