CVE-2025-34112

CRITICAL

Riverbed SteelCentral NetProfiler & NetExpress <10.8.7 - RCE

Title source: llm

Description

An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/40108
metasploit WORKING POC EXCELLENT
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb

Scores

CVSS v4 10.0
EPSS 0.4968
EPSS Percentile 97.8%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Details

CWE
CWE-266 CWE-306 CWE-78 CWE-89
Status published
Products (2)
Riverbed Technology/SteelCentral NetExpress 10.8.7
Riverbed Technology/SteelCentral NetProfiler 10.8.7
Published Jul 15, 2025
Tracked Since Feb 18, 2026