Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13798: Command Injection in ADSLR NBR1005GPEV2

0
Medium
VulnerabilityCVE-2025-13798cvecve-2025-13798
Published: Mon Dec 01 2025 (12/01/2025, 00:32:06 UTC)
Source: CVE Database V5
Vendor/Project: ADSLR
Product: NBR1005GPEV2

Description

A flaw has been found in ADSLR NBR1005GPEV2 250814-r037c. This affects the function ap_macfilter_add of the file /send_order.cgi. Executing manipulation of the argument mac can lead to command injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/08/2025, 01:00:28 UTC

Technical Analysis

CVE-2025-13798 is a command injection vulnerability identified in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the ap_macfilter_add function of the /send_order.cgi endpoint, which processes a 'mac' parameter. Improper input validation allows an attacker to inject arbitrary OS commands by manipulating this parameter. The attack vector is remote network access, requiring no authentication or user interaction, making exploitation straightforward for an attacker with network access to the device. The vulnerability can lead to full command execution on the router, enabling attackers to alter device configurations, intercept or redirect traffic, or pivot into internal networks. Despite early disclosure attempts, the vendor has not responded or provided a patch, and exploit code has been publicly released, increasing the risk of exploitation. The CVSS 4.0 score is 5.3 (medium), reflecting the ease of exploitation but limited scope and impact compared to critical vulnerabilities. The vulnerability affects a specific firmware version, so organizations using this version are at risk. The lack of vendor response and patch availability necessitates immediate defensive actions by users and network administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for small and medium enterprises (SMEs) and home office environments relying on the ADSLR NBR1005GPEV2 router. Successful exploitation can lead to unauthorized command execution, resulting in device compromise, network traffic interception, and potential lateral movement within corporate networks. This can compromise sensitive data confidentiality and integrity and disrupt network availability. Given the router's role as a network gateway, attackers could establish persistent access or launch further attacks against internal systems. The public availability of exploit code increases the likelihood of opportunistic attacks. Organizations lacking network segmentation or monitoring are especially vulnerable. The absence of a vendor patch prolongs exposure, necessitating reliance on compensating controls. The impact is amplified in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government entities within Europe.

Mitigation Recommendations

Since no official patch is available, European organizations should implement the following specific mitigations: 1) Immediately disable remote management interfaces on the ADSLR NBR1005GPEV2 router to prevent external exploitation. 2) Restrict network access to the router's management interface using firewall rules or access control lists, allowing only trusted internal IP addresses. 3) Employ network segmentation to isolate vulnerable routers from critical internal networks, limiting attacker lateral movement. 4) Monitor network traffic and device logs for unusual commands or access patterns indicative of exploitation attempts. 5) Replace or upgrade affected devices to models with vendor-supported firmware and security updates when feasible. 6) Deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting /send_order.cgi or related endpoints. 7) Educate IT staff about this vulnerability and ensure incident response plans include steps for compromised routers. 8) Consider using network-level anomaly detection tools to identify suspicious outbound connections originating from routers. These measures collectively reduce the attack surface and improve detection capabilities until a vendor patch is released or devices are replaced.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T13:58:31.728Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ce4c3a0d303b752af5f71

Added to database: 12/1/2025, 12:43:47 AM

Last enriched: 12/8/2025, 1:00:28 AM

Last updated: 1/19/2026, 11:59:48 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats