Bambu Studio 2.1.1.52 and earlier is affected by a vulnerability that allows arbitrary code execution during application startup. The application loads a network plugin without validating its digital signature or verifying its authenticity. A local attacker can exploit this behavior by placing a malicious component in the expected location, which is controllable by the attacker (e.g., under %APPDATA%), resulting in code execution within the context of the user. The main application is digitally signed, which may allow a malicious component to inherit trust and evade detection by security solutions that rely on signed parent processes.
References
Configurations
No configuration.
History
22 Oct 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Oct 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Oct 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
21 Oct 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-21 15:15
Updated : 2025-10-22 19:15
NVD link : CVE-2025-57521
Mitre link : CVE-2025-57521
CVE.ORG link : CVE-2025-57521
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')