Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems.
* vulnerabilities:
*
Improper Neutralization of Special Elements used in a Command ('Command Injection')
* Use of Hard-coded Credentials
* Improper Authentication
* Binding to an Unrestricted IP Address
The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.protns.com/53 |
![]() ![]() |
History
Tue, 15 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems. * vulnerabilities: * Improper Neutralization of Special Elements used in a Command ('Command Injection') * Use of Hard-coded Credentials * Improper Authentication * Binding to an Unrestricted IP Address The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required. | |
Title | Remote Code Execution in ProTNS ActADUR | |
Weaknesses | CWE-1327 CWE-287 CWE-77 CWE-798 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: FSI
Published: 2025-07-15T07:22:49.897Z
Updated: 2025-07-15T13:30:22.159Z
Reserved: 2025-04-15T00:51:18.177Z
Link: CVE-2025-3621

Updated: 2025-07-15T13:30:17.976Z

Status : Awaiting Analysis
Published: 2025-07-15T08:15:31.917
Modified: 2025-07-15T13:14:24.053
Link: CVE-2025-3621

No data.