CVE-2025-34112
CRITICALRiverbed SteelCentral NetProfiler & NetExpress <10.8.7 - RCE
Title source: llmDescription
An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/40108
metasploit
WORKING POC
EXCELLENT
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb
References (4)
Scores
CVSS v4
10.0
EPSS
0.4968
EPSS Percentile
97.8%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Details
CWE
CWE-266
CWE-306
CWE-78
CWE-89
Status
published
Products (2)
Riverbed Technology/SteelCentral NetExpress
10.8.7
Riverbed Technology/SteelCentral NetProfiler
10.8.7
Published
Jul 15, 2025
Tracked Since
Feb 18, 2026