A vulnerability exists in the Opto22 Groov Manage REST API on GRV-EPIC and groov RIO Products that allows remote code execution with root privileges. When a POST request is executed against the vulnerable endpoint, the application reads certain header details and unsafely uses these values to build commands, allowing an attacker with administrative privileges to inject arbitrary commands that execute as root.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in the Opto22 Groov Manage REST API on GRV-EPIC and groov RIO Products that allows remote code execution with root privileges. When a POST request is executed against the vulnerable endpoint, the application reads certain header details and unsafely uses these values to build commands, allowing an attacker with administrative privileges to inject arbitrary commands that execute as root. | |
| Title | Command Injection in Opto22 Groov REST API | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-11-20T21:32:37.510Z
Updated: 2025-11-21T16:01:40.324Z
Reserved: 2025-11-12T19:41:06.455Z
Link: CVE-2025-13087
Updated: 2025-11-21T16:01:36.546Z
Status : Awaiting Analysis
Published: 2025-11-20T22:15:54.310
Modified: 2025-11-21T15:13:13.800
Link: CVE-2025-13087
No data.