CVE-2025-10948: Buffer Overflow in MikroTik RouterOS
A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.20.1 and 7.21beta2 mitigates this issue. You should upgrade the affected component. The vendor replied: "Our bug tracker reports that your issue has been fixed. This means that we plan to release a RouterOS update with this fix. Make sure to upgrade to the next release when it comes out."
AI Analysis
Technical Summary
CVE-2025-10948 is a buffer overflow vulnerability identified in MikroTik RouterOS version 7, affecting the parse_json_element function in the /rest/ip/address/print endpoint, part of the libjson.so component. This vulnerability arises from improper handling of JSON data, allowing crafted input to overflow a buffer. The flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to arbitrary code execution or denial of service, impacting the confidentiality, integrity, and availability of affected devices. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity due to network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on all security properties. Although no active exploits have been reported in the wild, the public disclosure and availability of proof-of-concept code increase the risk of exploitation. MikroTik has addressed the issue in RouterOS version 7.21beta2 and plans to release an official patch soon. Organizations running vulnerable RouterOS versions should upgrade promptly to prevent exploitation. Given MikroTik's widespread use in enterprise and ISP network equipment, this vulnerability poses a significant risk to network infrastructure stability and security.
Potential Impact
For European organizations, this vulnerability presents a critical risk to network infrastructure, as MikroTik RouterOS is commonly deployed in enterprise, ISP, and critical infrastructure environments across Europe. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full device compromise, interception or manipulation of network traffic, and disruption of services. This could affect confidentiality by exposing sensitive network configuration and traffic, integrity by enabling unauthorized changes, and availability by causing device crashes or denial of service. Given the remote, unauthenticated nature of the exploit, attackers could target vulnerable routers at scale, impacting multiple organizations simultaneously. Critical sectors such as telecommunications, finance, government, and energy in Europe could face operational disruptions and data breaches. The public disclosure increases the likelihood of exploitation attempts, emphasizing the urgency for European entities to assess and remediate affected systems to maintain network security and service continuity.
Mitigation Recommendations
European organizations should immediately inventory their network devices to identify MikroTik RouterOS version 7 deployments. They should prioritize upgrading all affected devices to MikroTik RouterOS version 7.21beta2 or later once the official patch is released. Until upgrades are applied, organizations should restrict access to the REST API endpoint /rest/ip/address/print by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Monitoring network traffic for unusual JSON payloads targeting this endpoint can help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures for this vulnerability is recommended. Organizations should also review and tighten router management access policies, disable unnecessary services, and ensure robust logging and alerting are in place to facilitate rapid incident response. Regular backups of router configurations should be maintained to enable swift recovery if compromise occurs. Coordination with MikroTik support and staying informed on patch releases and advisories is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Czech Republic
CVE-2025-10948: Buffer Overflow in MikroTik RouterOS
Description
A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.20.1 and 7.21beta2 mitigates this issue. You should upgrade the affected component. The vendor replied: "Our bug tracker reports that your issue has been fixed. This means that we plan to release a RouterOS update with this fix. Make sure to upgrade to the next release when it comes out."
AI-Powered Analysis
Technical Analysis
CVE-2025-10948 is a buffer overflow vulnerability identified in MikroTik RouterOS version 7, affecting the parse_json_element function in the /rest/ip/address/print endpoint, part of the libjson.so component. This vulnerability arises from improper handling of JSON data, allowing crafted input to overflow a buffer. The flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to arbitrary code execution or denial of service, impacting the confidentiality, integrity, and availability of affected devices. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity due to network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on all security properties. Although no active exploits have been reported in the wild, the public disclosure and availability of proof-of-concept code increase the risk of exploitation. MikroTik has addressed the issue in RouterOS version 7.21beta2 and plans to release an official patch soon. Organizations running vulnerable RouterOS versions should upgrade promptly to prevent exploitation. Given MikroTik's widespread use in enterprise and ISP network equipment, this vulnerability poses a significant risk to network infrastructure stability and security.
Potential Impact
For European organizations, this vulnerability presents a critical risk to network infrastructure, as MikroTik RouterOS is commonly deployed in enterprise, ISP, and critical infrastructure environments across Europe. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full device compromise, interception or manipulation of network traffic, and disruption of services. This could affect confidentiality by exposing sensitive network configuration and traffic, integrity by enabling unauthorized changes, and availability by causing device crashes or denial of service. Given the remote, unauthenticated nature of the exploit, attackers could target vulnerable routers at scale, impacting multiple organizations simultaneously. Critical sectors such as telecommunications, finance, government, and energy in Europe could face operational disruptions and data breaches. The public disclosure increases the likelihood of exploitation attempts, emphasizing the urgency for European entities to assess and remediate affected systems to maintain network security and service continuity.
Mitigation Recommendations
European organizations should immediately inventory their network devices to identify MikroTik RouterOS version 7 deployments. They should prioritize upgrading all affected devices to MikroTik RouterOS version 7.21beta2 or later once the official patch is released. Until upgrades are applied, organizations should restrict access to the REST API endpoint /rest/ip/address/print by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Monitoring network traffic for unusual JSON payloads targeting this endpoint can help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures for this vulnerability is recommended. Organizations should also review and tighten router management access policies, disable unnecessary services, and ensure robust logging and alerting are in place to facilitate rapid incident response. Regular backups of router configurations should be maintained to enable swift recovery if compromise occurs. Coordination with MikroTik support and staying informed on patch releases and advisories is critical.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T06:03:48.610Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d54bd4b8fb385711ea40d4
Added to database: 9/25/2025, 2:04:04 PM
Last enriched: 10/13/2025, 7:15:27 AM
Last updated: 11/22/2025, 2:39:46 PM
Views: 1121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighCVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.