ZEN Load Balancer versions 2.0 and 3.0-rc1 contain a command injection vulnerability in content2-2.cgi. The filelog parameter is passed directly into a backtick-delimited exec() call without sanitation. An authenticated attacker can inject arbitrary shell commands, resulting in remote code execution as the root user. ZEN Load Balancer is the predecessor of ZEVENET and SKUDONET. The affected versions (2.0 and 3.0-rc1) are no longer supported. SKUDONET CE is the current community-maintained successor.
History

Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Zevenet
Zevenet zen Load Balancer
Vendors & Products Zevenet
Zevenet zen Load Balancer

Mon, 11 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 Aug 2025 15:00:00 +0000

Type Values Removed Values Added
Description ZEN Load Balancer versions 2.0 and 3.0-rc1 contain a command injection vulnerability in content2-2.cgi. The filelog parameter is passed directly into a backtick-delimited exec() call without sanitation. An authenticated attacker can inject arbitrary shell commands, resulting in remote code execution as the root user. ZEN Load Balancer is the predecessor of ZEVENET and SKUDONET. The affected versions (2.0 and 3.0-rc1) are no longer supported. SKUDONET CE is the current community-maintained successor.
Title ZEN Load Balancer Filelog Command Execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-11T14:55:52.604Z

Updated: 2025-08-11T15:41:57.646Z

Reserved: 2025-08-07T19:20:47.378Z

Link: CVE-2012-10039

cve-icon Vulnrichment

Updated: 2025-08-11T15:41:47.292Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-11T15:15:27.370

Modified: 2025-08-11T18:32:48.867

Link: CVE-2012-10039

cve-icon Redhat

No data.