VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
History

Fri, 05 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Veepn
Veepn veepn
Vendors & Products Veepn
Veepn veepn

Thu, 04 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
Title VeeVPN 1.6.1 - Unquoted Service Path Remote Code Execution
Weaknesses CWE-428
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-04T20:46:08.742Z

Updated: 2025-12-05T17:44:47.464Z

Reserved: 2025-12-04T16:25:29.546Z

Link: CVE-2025-66575

cve-icon Vulnrichment

Updated: 2025-12-05T17:44:35.299Z

cve-icon NVD

Status : Received

Published: 2025-12-04T21:16:10.413

Modified: 2025-12-05T18:15:59.980

Link: CVE-2025-66575

cve-icon Redhat

No data.