PT-2025-43608 · Openvpn Technologies · Openvpn

Published

2025-10-18

·

Updated

2025-10-29

·

CVE-2025-10680

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions OpenVPN versions 2.7 alpha1 through 2.7 beta1
Description The OpenVPN software contains a flaw related to the handling of special elements when processing arguments for the --dns and --dhcp-option features. This issue allows a remote, authenticated server to inject shell commands through DNS variables when the --dns-updown option is enabled. Approximately 3.3 million to 3.6 million devices are estimated to be potentially affected worldwide. The issue arises from unsanitized --dns and --dhcp-option parameters, enabling malicious DNS servers to execute commands on the client. The
--dns-updown
hook is used to execute scripts when DNS settings are updated. The vulnerability can be exploited when connecting to untrusted VPN services.
Recommendations OpenVPN versions 2.7 alpha1 through 2.7 beta1 are vulnerable and should be updated.

Fix

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2025-13551
CVE-2025-10680

Affected Products

Openvpn