Advisory Details

October 1st, 2025

Viessmann Vitogate 300 BN/MB vitogate.cgi form-0-2 Command Injection Remote Code Execution Vulnerability

ZDI-25-925
ZDI-CAN-23861

CVE ID CVE-2025-9494
CVSS SCORE 6.8, AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Viessmann
AFFECTED PRODUCTS Vitogate 300
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Viessmann Vitogate 300 BN/MB devices. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of JSON payload data provided to the vitogate.cgi endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device.

ADDITIONAL DETAILS Viessmann has issued an update to correct this vulnerability. More details can be found at:
https://www.cisa.gov/news-events/ics-advisories/icsa-25-266-04
DISCLOSURE TIMELINE
  • 2025-04-29 - Vulnerability reported to vendor
  • 2025-10-01 - Coordinated public release of advisory
  • 2025-10-01 - Advisory Updated
CREDIT adhkr - LuwakLab
BACK TO ADVISORIES