CrowdSec
8/10CrowdSec Score

Unity - RCE (CVE-2025-36604)

Published on04-08-2025
First seen on10-10-2025
CVSS 7.3/10Dell - Unity

278Exploiting IPs reported

Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution.

CrowdSec analysis

CVE-2025-36604 is an OS command injection vulnerability in Dell Unity versions 5.5 and earlier, allowing unauthenticated remote attackers to execute arbitrary commands on the affected system. This flaw could be leveraged to compromise system integrity, access sensitive data, or disrupt storage operations, posing a significant risk to enterprise environments.

CrowdSec has been tracking this vulnerability and its exploits since 9th of October 2025.

CrowdSec network observations suggest that most exploitation of CVE-2025-36604 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-36604 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit this vulnerability by sending specially crafted requests to URLs containing /misc/ with injected backticks and command substitution (e.g., ``/misc/`curl${IFS}```), targeting Dell UnityVSA systems to achieve remote command execution.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.