Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-54306

EPSS 0.29% · P53
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-54306

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. A remote code execution vulnerability exists in the network configuration functionality, stemming from insufficient input validation when processing network configuration parameters through administrative endpoints. The application allows administrators to modify the server's network configuration through the Django application. This configuration is processed by Bash scripts (TSsetnoproxy and TSsetproxy) that write user-controlled data directly to environment variables without proper sanitization. After updating environment variables, the scripts execute a source command on /etc/environment; if an attacker injects malicious data into environment variables, this command can enable arbitrary command execution. The vulnerability begins with the /admin/network endpoint, which passes user-supplied form data as arguments to subprocess.Popen calls. The user-supplied input is then used to update environment variables in TSsetnoproxy and TSsetproxy, and finally source $environment is executed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Thermo Fisher Torrent Suite Django application 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Thermo Fisher Torrent Suite Django application是美国Thermo Fisher公司的一个核心软件组件。 Thermo Fisher Torrent Suite Django application 5.18.1版本存在安全漏洞,该漏洞源于网络配置功能输入验证不足,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-54306

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-54306

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-12-04 · 32 CVEs total

CVE-2025-140124.7 MEDIUMJIZHICMS Batch Delete Comments deleteAll.html delete sql injection
CVE-2025-140114.7 MEDIUMJIZHICMS Add Display Name Field addcomment.html commentlist sql injection
CVE-2025-140132.4 LOWJIZHICMS Comment addcomment.html cross site scripting
CVE-2025-66373Akamai Ghost 安全漏洞
CVE-2025-65899Kalmia 安全漏洞
CVE-2025-63363Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63361Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63362Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65637Logrus 安全漏洞
CVE-2025-65806e-point CMS 安全漏洞
CVE-2025-29268ALLNET ALL-RUT22GW v3.3.8 安全漏洞
CVE-2025-29269ALLNET ALL-RUT22GW 安全漏洞
CVE-2025-65883Genexis Platinum P4410 安全漏洞
CVE-2025-63499SOGo 安全漏洞
CVE-2025-63896JXL 9 Inch Car Android Double Din Player 安全漏洞
CVE-2025-55948X-SpringBoot 安全漏洞
CVE-2025-65900Kalmia 安全漏洞
CVE-2025-63364Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65516Seafile Community Edition 安全漏洞
CVE-2025-61148EduplusCampus 安全漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-54306

No comments yet


Leave a comment