Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-70995

EPSS 0.42% · P62
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-70995

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. The vendor has fixed the issue in Aranda Service Desk V8 8.30.6.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Aranda Service Desk Web Edition 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Aranda Service Desk Web Edition是美国Aranda公司的一个流程管理服务台系统。 Aranda Service Desk Web Edition存在安全漏洞,该漏洞源于上传文件验证不当,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-70995

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-70995

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-03-05 · 18 CVEs total

CVE-2026-36063.3 LOWEttercap etterfilter ef_output.c add_data_segment out-of-bounds
CVE-2025-70229D-Link DIR-513 安全漏洞
CVE-2025-70948CouchAuth 安全漏洞
CVE-2025-70949CouchAuth 安全漏洞
CVE-2025-29165D-Link DIR-1253 MESH 安全漏洞
CVE-2025-70614OpenCode Systems OC Messaging / USSD Gateway OC 安全漏洞
CVE-2025-70616Wincor Nixdorf wnBios64.sys 安全漏洞
CVE-2025-70233D-Link DIR-513 安全漏洞
CVE-2025-70232D-Link DIR-513 安全漏洞
CVE-2025-69534Python-Markdown 安全漏洞
CVE-2025-70230D-Link DIR-513 安全漏洞
CVE-2025-70231D-Link DIR-513 安全漏洞
CVE-2025-45691ragas 安全漏洞
CVE-2026-26417Tata Consultancy Services Cognix Recon Client 安全漏洞
CVE-2026-26416Tata Consultancy Services Cognix Recon Client 安全漏洞
CVE-2026-26418Tata Consultancy Services Cognix Recon Client 安全漏洞
CVE-2026-26377Koha 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-70995

No comments yet


Leave a comment