A security flaw has been discovered in neurobin shc up to 4.0.3. Impacted is the function make of the file src/shc.c of the component Environment Variable Handler. The manipulation results in os command injection. The attack is only possible with local access. The exploit has been released to the public and may be exploited.
References
| Link | Resource |
|---|---|
| https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01 | Broken Link |
| https://vuldb.com/?ctiid.320557 | Permissions Required VDB Entry |
| https://vuldb.com/?id.320557 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.630744 | Third Party Advisory VDB Entry |
| https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01 | Broken Link |
Configurations
History
No history.
Information
Published : 2025-08-20 00:15
Updated : 2025-09-12 14:06
NVD link : CVE-2025-9176
Mitre link : CVE-2025-9176
CVE.ORG link : CVE-2025-9176
JSON object : View
Products Affected
neurobin
- shc
