A vulnerability was detected in CosmodiumCS OnlyRAT up to 3.2. The affected element is the function connect/remote_upload/remote_download of the file main.py of the component Configuration File Handler. The manipulation of the argument configuration["PASSWORD"] results in os command injection. The attack requires a local approach. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Mon, 22 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cosmodiumcs
Cosmodiumcs onlyrat |
|
Vendors & Products |
Cosmodiumcs
Cosmodiumcs onlyrat |
Sun, 21 Sep 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was detected in CosmodiumCS OnlyRAT up to 3.2. The affected element is the function connect/remote_upload/remote_download of the file main.py of the component Configuration File Handler. The manipulation of the argument configuration["PASSWORD"] results in os command injection. The attack requires a local approach. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | CosmodiumCS OnlyRAT Configuration File main.py remote_download os command injection | |
Weaknesses | CWE-77 CWE-78 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-21T22:02:07.886Z
Updated: 2025-09-21T22:02:07.886Z
Reserved: 2025-09-21T08:06:20.191Z
Link: CVE-2025-10767

No data.

No data.

No data.