Ad

CVE-2019-25243

HIGH CVSS 4.0: 8.7 EPSS 1.00%
Updated Dec 30, 2025
Iwt
Parameter Value
CVSS 8.7 (HIGH)
Type CWE-78 (OS Command Injection)
Vendor Iwt
Public PoC Yes

FaceSentry 6.4.8 contains an authenticated remote command injection vulnerability in pingTest.php and tcpPortTest.php scripts. Attackers can exploit unsanitized input parameters to inject and execute arbitrary shell commands with root privileges by manipulating the 'strInIP' and 'strInPort' parameters.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 6

Configuration From (including) Up to (excluding)
Iwt Facesentry_Access_Control_System_Firmware
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.0:*:*:*:*:*:*:*
Iwt Facesentry_Access_Control_System
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*
Iwt Facesentry_Access_Control_System_Firmware
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:5.7.2:*:*:*:*:*:*:*
Iwt Facesentry_Access_Control_System
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*
Iwt Facesentry_Access_Control_System_Firmware
cpe:2.3:o:iwt:facesentry_access_control_system_firmware:6.4.8:*:*:*:*:*:*:*
Iwt Facesentry_Access_Control_System
cpe:2.3:h:iwt:facesentry_access_control_system:-:*:*:*:*:*:*:*