CVE-2025-7451

Hgiga · Hgiga iSherlock (Multiple Products)

A critical vulnerability has been identified in multiple Hgiga iSherlock products, designated CVE-2025-7451.

Executive summary

A critical vulnerability has been identified in multiple Hgiga iSherlock products, designated CVE-2025-7451. This flaw allows a remote, unauthenticated attacker to execute arbitrary commands on the affected server, potentially leading to a complete system compromise. Due to the ease of exploitation and severe impact, immediate remediation is required to prevent data theft, service disruption, or further network intrusion.

Vulnerability

The vulnerability is an unauthenticated OS Command Injection. An attacker can send a specially crafted network request to a vulnerable component of the iSherlock software. This request contains malicious operating system commands which are then executed by the server with the privileges of the application's user account. As no authentication is required, any attacker with network access to the device can exploit this flaw to take control of the system.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a devastating business impact, allowing an attacker to achieve full control over the compromised server. Potential consequences include the theft of sensitive corporate or customer data, deployment of ransomware, complete disruption of business services hosted on the device, and using the compromised system as a pivot point to launch further attacks against the internal network. This poses a significant risk of financial loss, reputational damage, and regulatory penalties.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. All instances of affected Hgiga iSherlock products should be updated to the latest patched version as a top priority.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review application and web server access logs for unusual requests containing shell metacharacters (e.g., |, &, ;, $(), `). Monitor network traffic for unexpected outbound connections from the iSherlock servers and monitor the systems for any unauthorized processes or file modifications.

Compensating Controls: If patching cannot be performed immediately, implement compensating controls. Restrict network access to the management interface of the iSherlock devices using a firewall, allowing connections only from trusted IP addresses. If applicable, deploy a Web Application Firewall (WAF) with rules designed to detect and block OS command injection attempts.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity of CVE-2025-7451, we strongly recommend that organizations treat this vulnerability with the highest priority. The risk of a full system compromise by an unauthenticated attacker is substantial. All affected Hgiga iSherlock products must be patched immediately. If immediate patching is not feasible, the compensating controls listed above must be implemented without delay to reduce the attack surface while a patching schedule is finalized. Do not wait for evidence of active exploitation or inclusion in the CISA KEV catalog to act.