Bambu Studio 2.1.1.52 and earlier is affected by a vulnerability that allows arbitrary code execution during application startup. The application loads a network plugin without validating its digital signature or verifying its authenticity. A local attacker can exploit this behavior by placing a malicious component in the expected location, which is controllable by the attacker (e.g., under %APPDATA%), resulting in code execution within the context of the user. The main application is digitally signed, which may allow a malicious component to inherit trust and evade detection by security solutions that rely on signed parent processes.
                
            References
                    Configurations
                    No configuration.
History
                    22 Oct 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
22 Oct 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.1 | 
| CWE | CWE-77 | 
21 Oct 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-21 15:15
Updated : 2025-10-22 19:15
NVD link : CVE-2025-57521
Mitre link : CVE-2025-57521
CVE.ORG link : CVE-2025-57521
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
