7 CVE-2025-9016

 

A vulnerability was identified in Mechrevo Control Center GX V2 5.56.51.48. This affects an unknown part of the file C:Program FilesOEM机械革命控制中心AiStoneServiceMyControlCenterCommand of the component Powershell Script Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.
https://nvd.nist.gov/vuln/detail/CVE-2025-9016

Categories

CWE-426 : Untrusted Search Path

References

134c704f-9b21-4f2e-91b3-4a467353bcc0

https://vuldb.com/?submit.624900
Third Party Advisory VDB Entry

cna@vuldb.com

https://drive.proton.me/urls/7QYSEW6734#H3N4fQ3mw6gX
Broken Link
https://vuldb.com/?ctiid.320067
Permissions Required VDB Entry
https://vuldb.com/?id.320067
Third Party Advisory VDB Entry
https://vuldb.com/?submit.624900
Third Party Advisory VDB Entry


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:mechrevo:control_center_gx_v2:5.56.51.48:*:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
38 Leveraging/Manipulating Configuration File Search Paths
Very High


MITRE


Techniques

id description
T1574.007 Hijack Execution Flow:Path Interception by PATH Environment Variable
T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.