CVE Alert: CVE-2024-12925 – Akınsoft – QR Menü

CVE-2024-12925

HIGHNo exploitation known

Improper Validation of Certificate with Host Mismatch vulnerability in Akınsoft QR Menü allows HTTP Response Splitting.This issue affects QR Menü: from s1.05.05 before v1.05.12.

CVSS v3.1 (7.3)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Akınsoft
Product
QR Menü
Versions
s1.05.05 lt v1.05.12
CWE
CWE-297, CWE-297 Improper Validation of Certificate with Host Mismatch
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Published
2025-09-01T12:39:26.843Z
Updated
2025-09-01T12:39:26.843Z

AI Summary Analysis

Risk verdict

High risk: the issue enables remote, unauthenticated exploitation via host header handling in the QR Menu service.

Why this matters

HTTP Response Splitting can lead to response injection, cache poisoning and, in some deployments, user-facing content manipulation or session exposure. For kiosks or web front-ends used by customers, this could enable phishing, defacement, or leakage of menu/session data, with potential reputational and trust impact.

Most likely attack path

An attacker remotely targets an exposed QR Menu endpoint with crafted HTTP requests containing manipulated host headers. No authentication or user interaction is required, and attack complexity is low, making broad scanning feasible. Exploitation could cause the server to emit split responses, enabling downstream content tampering or information leakage within the client session or cached responses.

Who is most exposed

Publicly reachable QR Menu installations in hospitality venues or retail outlets, often integrated with POS or customer-facing web interfaces, are most at risk. Deployments on on-premise or cloud-hosted web front-ends that accept external traffic are the likeliest victims.

Detection ideas

  • Look for anomalous HTTP responses with injected CRLF or unexpected header termination.
  • Logs showing host header values that differ from canonical or contain newline characters.
  • Content-length or chunked-encoding mismatches following requests with suspicious headers.
  • WAF/SIEM alerts for HTTP response splitting patterns.
  • Unexpected changes in response bodies for endpoints handling menus or orders.

Mitigation and prioritisation

  • Patch to v1.05.12+ or apply vendor fix; verify host header validation is enforced server-side.
  • Implement strict host header validation and canonical host enforcement; sanitise/validate user-provided headers.
  • Enable WAF rules to detect and block CRLF injection and response-splitting patterns; review TLS and edge-casing configurations.
  • Reconfirm change management: test in staging, then phased rollout; monitor for impact on kiosk/Web flows.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.