CVE-2025-64348
31.10.2025, 19:15
ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.Enginsight
| Vendor | Product | Version |
|---|---|---|
| elog_project | elog | 𝑥 ≤ 3.1.5-20251014 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References