🟑 CVE-2025-61932

Critical vulnerability in Motex Lanscope Endpoint Manager allowing remote code execution through improper verification of incoming network requests. Active exploitation confirmed with CISA KEV listing.

← Back to Overview
MEDIUM_RISK
Risk Level
T1190
MITRE Technique
9.8
CVSS Score
NETWORK
Attack Vector
MEDIUM
Deployment Risk

πŸ“‹ Vulnerability Details

Data Source: CIRCL

Confidence: MEDIUM

Exploitation Method: DIRECT_NETWORK

CVE Published: 2025-10-20

Added to CISA KEV: 2025-10-22 2 DAYS BETWEEN CVE AND KEV

🎯 Recommendations:

πŸ” Web Intelligence

Key Sources:

  • CVE-2025-61932 - Exploits & Severity - Feedly

    NVD published the first details for CVE-2025-61932.CVE-2025-61932 9.8 Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing attackers to perform unauthorized actions. CVE-2025-11948 9.8 Document Management System developed by Excellent Infotek has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload arbitrary files.

  • CVE-2025-61932 Security Vulnerability & Exploit Details

    The exploitability of CVE-2025-61932 depends on two key factors: attack complexity (the level of effort required to execute an exploit) and privileges required (the access level an attacker needs). Exploitability Analysis for CVE-2025-61932 With low attack complexity and no required privileges, CVE-2025-61932 is an easy target for cybercriminals. Organizations should prioritize immediate ...

  • CVE-2025-61932 : Lanscope Endpoint Manager (On-Premises) (Client ...

    Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.

  • Known Exploited Vulnerabilities Catalog

    CVE-2025-61932. Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability: Β· Related CWE: CWE-940. Known To Be ...

  • LANSCOPE Endpoint Manager Flaw Allows Remote Code Execution

    The attack does not require user interaction, meaning systems are at risk even if no one clicks on a suspicious link or opens an email attachment. For organizations using Endpoint Manager On-Premise Edition, the risk is urgent, while users of the Cloud Edition remain unaffected. The vulnerability carries a CVSS 3.0 score of 9.8, placing it in the β€œemergency” category due to its potential impact and ease of exploitation. Below is a summary of the affected components: CVE ID. Product. CVSS 3.0 Score. CVE-2025-61932. LANSCOPE Endpoint Manager On-Premise Edition.