Vulnerability Database

309,136

Total vulnerabilities in the database

CVE-2025-27027

A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions.

  • Published: Jul 9, 2025
  • Updated: Nov 16, 2025
  • CVE: CVE-2025-27027
  • Severity: Low
  • Exploit:

CVSS v3:

  • Severity: Low
  • Score: 4.1
  • AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

CWEs: