Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise.
History

Wed, 24 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host
CPEs cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*
cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*
Vendors & Products Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 22 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Printerlogic
Printerlogic vasion Print
Printerlogic virtual Appliance
Vendors & Products Printerlogic
Printerlogic vasion Print
Printerlogic virtual Appliance

Fri, 19 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 19 Sep 2025 19:00:00 +0000

Type Values Removed Values Added
Description Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise.
Title Vasion Print (formerly PrinterLogic) Dangerous PHP Dead Code Enables RCE
Weaknesses CWE-561
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-09-19T18:50:38.657Z

Updated: 2025-09-20T03:55:45.972Z

Reserved: 2025-04-15T19:15:22.571Z

Link: CVE-2025-34205

cve-icon Vulnrichment

Updated: 2025-09-19T20:11:59.131Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-19T19:15:41.470

Modified: 2025-09-24T19:20:30.783

Link: CVE-2025-34205

cve-icon Redhat

No data.