๐Ÿ” CVE Alert

CVE-2025-34112

UNKNOWN 0.0

Riverbed SteelCentral NetProfiler / NetExpress 10.8.7 RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.

CWE CWE-89 CWE-78 CWE-306 CWE-266
Vendor riverbed technology
Product steelcentral netexpress
Published Jul 15, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for riverbed technology steelcentral netexpress

Be the first to know when new unknown vulnerabilities affecting riverbed technology steelcentral netexpress are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Riverbed Technology / SteelCentral NetExpress
10.8.7
Riverbed Technology / SteelCentral NetProfiler
10.8.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/40108 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb support.riverbed.com: https://support.riverbed.com/content/support/software/steelcentral-npm/net-profiler.html vulncheck.com: https://www.vulncheck.com/advisories/riverbed-steel-central-net-profiler-net-express-rce

Credits

Francesco Oddo of Security-Assessment.com