Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-67840

CVSS 7.2 · High EPSS 0.05% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-67840

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4.0 Build 14614 through TZM_1757588060_SEP2025_FULL.depot web application API endpoints (including Scheduler and Actions pages). The appliance directly concatenates user-controlled parameters into system commands without sufficient sanitisation, allowing an authenticated admin user to inject and execute arbitrary OS commands with root privileges. An attacker can intercept legitimate requests (e.g. during job creation or execution) using a proxy and modify parameters to include shell metacharacters, achieving remote code execution on the appliance. This completely bypasses the intended CLISH restricted shell confinement and results in full system compromise. The vulnerabilities persist in Release 4.0 Build 14614 including the latest patch (as of the time of testing) TZM_1757588060_SEP2025_FULL.depot.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cohesity TranZman 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cohesity TranZman是Cohesity公司的一个数据迁移与恢复软件。 Cohesity TranZman 4.0 Build 14614存在安全漏洞,该漏洞源于多个经过身份验证的OS命令注入漏洞,可能导致经过身份验证的管理员用户注入并执行具有root权限的任意OS命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-67840

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-67840

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-03-03 · 50 CVEs total

CVE-2025-123458.8 HIGHLLM-Claw Agent Deployment initiate.c agent_deploy_init buffer overflow
CVE-2025-639097.2 HIGHCohesity TranZman 安全漏洞
CVE-2025-639117.2 HIGHCohesity TranZman 安全漏洞
CVE-2025-639107.2 HIGHCohesity TranZman 安全漏洞
CVE-2026-34556.1 MEDIUMmailparser 安全漏洞
CVE-2026-34493.3 LOW@tootallnate/once 安全漏洞
CVE-2023-310442.0 LOWNokia Impact Mobile 安全漏洞
CVE-2025-70241D-Link DIR-513 安全漏洞
CVE-2025-70237D-Link DIR-513 安全漏洞
CVE-2025-70240D-Link DIR-513 安全漏洞
CVE-2024-55020Weintek cMT-3072XH2 easyweb 安全漏洞
CVE-2024-55026Weintek cMT-3072XH2 easyweb 安全漏洞
CVE-2024-55021Weintek cMT 安全漏洞
CVE-2024-55019Weintek cMT 安全漏洞
CVE-2025-66945Zdir Pro 安全漏洞
CVE-2026-26887SourceCodester Pharmacy Point of Sale System 安全漏洞
CVE-2026-26889SourceCodester Pharmacy Point of Sale System 安全漏洞
CVE-2026-26892SourceCodester Logistic Hub Parcel Management System 安全漏洞
CVE-2026-26891SourceCodester Logistic Hub Parcel Management System 安全漏洞
CVE-2024-55024Weintek cMT-3072XH2 easyweb 安全漏洞

Showing top 20 of 50 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-67840

No comments yet


Leave a comment