VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
Metrics
Affected Vendors & Products
References
History
Fri, 05 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veepn
Veepn veepn |
|
| Vendors & Products |
Veepn
Veepn veepn |
Thu, 04 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem. | |
| Title | VeeVPN 1.6.1 - Unquoted Service Path Remote Code Execution | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-04T20:46:08.742Z
Updated: 2025-12-05T17:44:47.464Z
Reserved: 2025-12-04T16:25:29.546Z
Link: CVE-2025-66575
Updated: 2025-12-05T17:44:35.299Z
Status : Received
Published: 2025-12-04T21:16:10.413
Modified: 2025-12-05T18:15:59.980
Link: CVE-2025-66575
No data.