CVE-2025-59741

AndSoft · AndSoft e-TMS

A critical vulnerability has been identified in AndSoft's e-TMS software, allowing attackers to take complete control of the server.

Executive summary

A critical vulnerability has been identified in AndSoft's e-TMS software, allowing attackers to take complete control of the server. By sending a malicious network request, an attacker can execute arbitrary commands, potentially leading to data theft, service disruption, and further compromise of the internal network. Due to the ease of exploitation and the severity of the impact, this vulnerability requires immediate attention.

Vulnerability

This is an operating system (OS) command injection vulnerability. An unauthenticated remote attacker can send a specially crafted POST request to the e-TMS application. The application fails to properly sanitize user-supplied input within this request, allowing the attacker to inject and execute arbitrary OS commands on the underlying server with the privileges of the web application's user account.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation would result in a full compromise of the affected server. The potential business impact includes the exfiltration of sensitive business, customer, or financial data managed by the e-TMS platform, deployment of ransomware, complete disruption of logistics and transport management services, and the use of the compromised server as a pivot point to launch further attacks against the internal corporate network.

Remediation

Immediate Action: Immediately update all instances of AndSoft's e-TMS to the latest patched version as recommended by the vendor. After patching, it is crucial to monitor for any signs of post-compromise activity by reviewing server and application access logs for unusual POST requests or suspicious command executions that may have occurred prior to the update.

Proactive Monitoring:

  • In web server and application logs, search for anomalous POST requests, especially those containing shell command characters (e.g., |, ;, &, &&, $(), `).
  • Monitor for any unexpected outbound network connections originating from the e-TMS server.
  • Use Endpoint Detection and Response (EDR) or system monitoring tools to detect suspicious processes being spawned by the web server's service account (e.g., cmd.exe, powershell.exe, sh, bash).

Compensating Controls: If patching cannot be performed immediately, implement the following controls:

  • Deploy a Web Application Firewall (WAF) with rulesets designed to detect and block OS command injection attempts in POST requests.
  • Strictly limit network access to the e-TMS application, allowing connections only from trusted IP address ranges.
  • Ensure the application is running under a least-privilege user account to limit the potential damage of a successful exploit.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a critical and immediate risk to the organization. A CVSS score of 9.8 indicates that the vulnerability is remotely exploitable with low attack complexity and no user interaction required, leading to complete system compromise. While not currently on the CISA KEV list, its severity makes it a prime candidate for future inclusion. The primary recommendation is to apply the vendor-supplied patches to all affected AndSoft e-TMS instances immediately. If patching must be delayed, the compensating controls, particularly the implementation of a WAF and strict network access restrictions, must be deployed as a high-priority interim measure.