CVE-2025-57802

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-57802
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57802.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-57802
Aliases
  • GHSA-hrfv-wm8p-mg8m
Published
2025-08-25T18:15:30Z
Modified
2025-08-26T19:29:23.645028Z
Summary
[none]
Details

Airlink's Daemon interfaces with Docker and the Panel to provide secure access for controlling instances via the Panel. In version 1.0.0, an attacker with access to the affected container can create symbolic links inside the mounted directory (/app/data). Because the container bind-mounts an arbitrary host path, these symlinks can point to sensitive locations on the host filesystem. When the application or other processes follow these symlinks, the attacker can gain unauthorized read access to host files outside the container. This issue has been patched in version 1.0.1.

References

Affected packages

Git / github.com/airlinklabs/daemon

Affected ranges

Type
GIT
Repo
https://github.com/airlinklabs/daemon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed