VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
References
| Link | Resource |
|---|---|
| https://github.com/veepn/veepn | Broken Link |
| https://veepn.com/ | Product |
| https://www.exploit-db.com/exploits/52088 | Exploit |
| https://www.vulncheck.com/advisories/veevpn-161-unquoted-service-path-remote-code-execution | Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/52088 | Exploit |
Configurations
History
17 Dec 2025, 16:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/veepn/veepn - Broken Link | |
| References | () https://veepn.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/52088 - Exploit | |
| References | () https://www.vulncheck.com/advisories/veevpn-161-unquoted-service-path-remote-code-execution - Third Party Advisory, VDB Entry | |
| First Time |
Veevpn
Veevpn veevpn |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:veevpn:veevpn:1.6.1:*:*:*:*:*:*:* |
05 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/52088 - |
04 Dec 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-04 21:16
Updated : 2025-12-17 16:31
NVD link : CVE-2025-66575
Mitre link : CVE-2025-66575
CVE.ORG link : CVE-2025-66575
JSON object : View
Products Affected
veevpn
- veevpn
CWE
CWE-428
Unquoted Search Path or Element
