Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems. 
* vulnerabilities:
  *  
Improper Neutralization of Special Elements used in a Command ('Command Injection')
  *  Use of Hard-coded Credentials
  *  Improper Authentication
  *  Binding to an Unrestricted IP Address
The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.protns.com/53 |     | 
History
                    Tue, 15 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Tue, 15 Jul 2025 07:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Vulnerabilities* in ActADUR local server product, developed and maintained by ProTNS, allows Remote Code Inclusion on host systems. * vulnerabilities: * Improper Neutralization of Special Elements used in a Command ('Command Injection') * Use of Hard-coded Credentials * Improper Authentication * Binding to an Unrestricted IP Address The vulnerability has been rated as critical.This issue affects ActADUR: from v2.0.1.9 before v2.0.2.0., hence updating to version v2.0.2.0. or above is required. | |
| Title | Remote Code Execution in ProTNS ActADUR | |
| Weaknesses | CWE-1327 CWE-287 CWE-77 CWE-798 | |
| References |  | |
| Metrics | cvssV3_1 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: FSI
Published: 2025-07-15T07:22:49.897Z
Updated: 2025-07-15T13:30:22.159Z
Reserved: 2025-04-15T00:51:18.177Z
Link: CVE-2025-3621
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-15T13:30:17.976Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-15T08:15:31.917
Modified: 2025-07-15T13:14:24.053
Link: CVE-2025-3621
 Redhat
                        Redhat
                    No data.