Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-34311

IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP POST to /cgi-bin/logs.cgi/calamaris.dat and reads the values of DAY_BEGIN, MONTH_BEGIN, YEAR_BEGIN, DAY_END, MONTH_END, YEAR_END, NUM_DOMAINS, PERF_INTERVAL, NUM_CONTENT, HIST_LEVEL, NUM_HOSTS, NUM_URLS, and BYTE_UNIT, which are interpolated directly into the shell invocation of the mkreport helper. Because these parameters are never sanitized for improper characters or constructs, a crafted POST can inject shell metacharacters into one or more fields, causing arbitrary commands to run with the privileges of the 'nobody' user.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 68.0%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2025-34311
  • Ipfire » Ipfire » Version: 1.49
    cpe:2.3:a:ipfire:ipfire:1.49
  • Ipfire » Ipfire » Version: 2.1
    cpe:2.3:a:ipfire:ipfire:2.1
  • Ipfire » Ipfire » Version: 2.11
    cpe:2.3:a:ipfire:ipfire:2.11
  • Ipfire » Ipfire » Version: 2.13
    cpe:2.3:a:ipfire:ipfire:2.13
  • Ipfire » Ipfire » Version: 2.15
    cpe:2.3:a:ipfire:ipfire:2.15
  • Ipfire » Ipfire » Version: 2.17
    cpe:2.3:a:ipfire:ipfire:2.17
  • Ipfire » Ipfire » Version: 2.19
    cpe:2.3:a:ipfire:ipfire:2.19
  • Ipfire » Ipfire » Version: 2.21
    cpe:2.3:a:ipfire:ipfire:2.21
  • Ipfire » Ipfire » Version: 2.23
    cpe:2.3:a:ipfire:ipfire:2.23
  • Ipfire » Ipfire » Version: 2.25
    cpe:2.3:a:ipfire:ipfire:2.25
  • Ipfire » Ipfire » Version: 2.27
    cpe:2.3:a:ipfire:ipfire:2.27
  • Ipfire » Ipfire » Version: 2.29
    cpe:2.3:a:ipfire:ipfire:2.29


Contact Us

Shodan ® - All rights reserved