Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10870: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in DIAL CentrosNet

0
Critical
VulnerabilityCVE-2025-10870cvecve-2025-10870cwe-89
Published: Fri Nov 07 2025 (11/07/2025, 09:26:39 UTC)
Source: CVE Database V5
Vendor/Project: DIAL
Product: CentrosNet

Description

SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'.

AI-Powered Analysis

AILast updated: 11/14/2025, 10:10:16 UTC

Technical Analysis

CVE-2025-10870 is a critical SQL injection vulnerability identified in DIAL's CentrosNet version 2.64 and earlier. The flaw resides in the improper neutralization of special elements in the 'ultralogin' parameter processed by the /centrosnet/ultralogin.php script. An attacker can exploit this by sending crafted POST or GET requests that inject malicious SQL commands, enabling unauthorized access to the backend database. This can lead to unauthorized retrieval, modification, creation, or deletion of database records, severely compromising data confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects the ease of exploitation and the high impact on all security properties. Although no public exploits have been observed yet, the critical nature of the vulnerability and the widespread use of CentrosNet in network management contexts make it a significant threat. The lack of an official patch at the time of publication increases the urgency for interim mitigations and monitoring.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe data breaches, unauthorized data manipulation, and potential disruption of network management operations. Given CentrosNet's role in managing network devices and infrastructure, attackers could leverage this flaw to compromise critical systems, leading to operational downtime or further lateral movement within networks. Confidential information stored in the databases could be exposed or altered, impacting privacy compliance obligations such as GDPR. The integrity of network configurations could be undermined, causing service outages or degraded performance. The availability of network services might also be affected if attackers delete or corrupt essential data. The vulnerability's remote exploitability without authentication increases the risk of widespread attacks, especially in sectors with high reliance on DIAL products, including telecommunications, government agencies, and critical infrastructure providers across Europe.

Mitigation Recommendations

Immediate mitigation steps include implementing strict input validation and sanitization on the 'ultralogin' parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Network segmentation should be enforced to restrict access to the /centrosnet/ultralogin.php endpoint only to trusted internal systems or administrators. Monitoring and logging of all requests to this endpoint should be enhanced to detect anomalous or suspicious activity indicative of exploitation attempts. Organizations should engage with DIAL to obtain and apply security patches or updates as soon as they become available. In the interim, consider disabling or restricting access to the vulnerable functionality if feasible. Conduct thorough audits of database integrity and access logs to identify any prior unauthorized activity. Additionally, implement least privilege principles for database access and ensure backups are current and tested for recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-09-23T10:22:37.437Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690dbd9f03ca3124669e5516

Added to database: 11/7/2025, 9:36:31 AM

Last enriched: 11/14/2025, 10:10:16 AM

Last updated: 12/22/2025, 6:15:58 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats