An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices.
History

Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Viessmann
Viessmann vitogate 300
Vendors & Products Viessmann
Viessmann vitogate 300

Tue, 23 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 01:45:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices.
Title Viessmann Vitogate 300 OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published: 2025-09-23T01:12:17.459Z

Updated: 2025-09-23T13:34:06.974Z

Reserved: 2025-08-26T17:40:54.110Z

Link: CVE-2025-9494

cve-icon Vulnrichment

Updated: 2025-09-23T13:34:04.246Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-23T02:15:47.410

Modified: 2025-09-24T18:11:24.520

Link: CVE-2025-9494

cve-icon Redhat

No data.