CVE-2025-0798

A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. This issue affects some unknown processing of the file rtscanner of the component Quarantine Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/dmknght/FIS_RnD/blob/main/escan_rtscanner_rce.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.293921 Permissions Required VDB Entry
https://vuldb.com/?id.293921 Third Party Advisory VDB Entry
https://vuldb.com/?submit.484718 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*

History

No history.

Information

Published : 2025-01-29 02:15

Updated : 2025-10-09 20:53


NVD link : CVE-2025-0798

Mitre link : CVE-2025-0798

CVE.ORG link : CVE-2025-0798


JSON object : View

Products Affected

escanav

  • escan_anti-virus
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')