CVE-2025-13799: Command Injection in ADSLR NBR1005GPEV2
A vulnerability has been found in ADSLR NBR1005GPEV2 250814-r037c. This vulnerability affects the function ap_macfilter_del of the file /send_order.cgi. The manipulation of the argument mac leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13799 is a command injection vulnerability identified in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the ap_macfilter_del function of the /send_order.cgi endpoint, where the mac parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it a significant risk for exposed devices. The vulnerability was responsibly disclosed to the vendor, who has not issued a response or patch. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation (network accessible, no privileges needed), but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability could allow attackers to execute commands with the privileges of the web server process, potentially leading to full device compromise, network disruption, or pivoting to internal networks. No public exploits have been observed in the wild yet, but the public disclosure increases the risk of exploitation. The affected product is a network router commonly used in small to medium enterprise or residential environments, which may be part of critical network infrastructure. The lack of vendor response and patch availability necessitates immediate defensive measures by users and administrators.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized remote command execution on affected ADSLR NBR1005GPEV2 routers. Successful exploitation could lead to device takeover, allowing attackers to manipulate network traffic, intercept sensitive data, disrupt connectivity, or use the compromised router as a foothold for further attacks within the internal network. This is particularly concerning for organizations relying on these routers for critical communications or those with remote management interfaces exposed to the internet. The medium severity score reflects limited but tangible impacts on confidentiality, integrity, and availability. However, the absence of authentication and user interaction requirements increases the likelihood of exploitation if devices are exposed. The lack of vendor patch means organizations must rely on network-level mitigations or device replacement to reduce risk. Disruption or compromise of network infrastructure could affect business continuity, data privacy compliance, and operational security, especially in sectors like finance, healthcare, and government within Europe.
Mitigation Recommendations
1. Immediately identify and inventory all ADSLR NBR1005GPEV2 devices running firmware version 250814-r037c within the network. 2. Restrict remote access to the router management interface by implementing network segmentation and firewall rules to block external access to /send_order.cgi or the router’s web interface. 3. Disable or limit the use of MAC filtering features if not essential, as the vulnerability is in the ap_macfilter_del function. 4. Monitor network traffic and device logs for unusual command execution patterns or unexpected outbound connections indicative of exploitation attempts. 5. If possible, upgrade to a newer firmware version or alternative device models not affected by this vulnerability; if no patch is available, consider device replacement. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting this endpoint. 7. Educate IT staff about this vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Regularly review and update network device configurations to minimize exposure of management interfaces. 9. Engage with ADSLR or third-party security vendors for potential unofficial patches or workarounds. 10. Implement network-level anomaly detection to identify lateral movement or unusual activity stemming from compromised routers.
Affected Countries
Germany, France, Italy, Spain, United Kingdom
CVE-2025-13799: Command Injection in ADSLR NBR1005GPEV2
Description
A vulnerability has been found in ADSLR NBR1005GPEV2 250814-r037c. This vulnerability affects the function ap_macfilter_del of the file /send_order.cgi. The manipulation of the argument mac leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13799 is a command injection vulnerability identified in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the ap_macfilter_del function of the /send_order.cgi endpoint, where the mac parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it a significant risk for exposed devices. The vulnerability was responsibly disclosed to the vendor, who has not issued a response or patch. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation (network accessible, no privileges needed), but limited impact on confidentiality, integrity, and availability (each rated low). The vulnerability could allow attackers to execute commands with the privileges of the web server process, potentially leading to full device compromise, network disruption, or pivoting to internal networks. No public exploits have been observed in the wild yet, but the public disclosure increases the risk of exploitation. The affected product is a network router commonly used in small to medium enterprise or residential environments, which may be part of critical network infrastructure. The lack of vendor response and patch availability necessitates immediate defensive measures by users and administrators.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized remote command execution on affected ADSLR NBR1005GPEV2 routers. Successful exploitation could lead to device takeover, allowing attackers to manipulate network traffic, intercept sensitive data, disrupt connectivity, or use the compromised router as a foothold for further attacks within the internal network. This is particularly concerning for organizations relying on these routers for critical communications or those with remote management interfaces exposed to the internet. The medium severity score reflects limited but tangible impacts on confidentiality, integrity, and availability. However, the absence of authentication and user interaction requirements increases the likelihood of exploitation if devices are exposed. The lack of vendor patch means organizations must rely on network-level mitigations or device replacement to reduce risk. Disruption or compromise of network infrastructure could affect business continuity, data privacy compliance, and operational security, especially in sectors like finance, healthcare, and government within Europe.
Mitigation Recommendations
1. Immediately identify and inventory all ADSLR NBR1005GPEV2 devices running firmware version 250814-r037c within the network. 2. Restrict remote access to the router management interface by implementing network segmentation and firewall rules to block external access to /send_order.cgi or the router’s web interface. 3. Disable or limit the use of MAC filtering features if not essential, as the vulnerability is in the ap_macfilter_del function. 4. Monitor network traffic and device logs for unusual command execution patterns or unexpected outbound connections indicative of exploitation attempts. 5. If possible, upgrade to a newer firmware version or alternative device models not affected by this vulnerability; if no patch is available, consider device replacement. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting this endpoint. 7. Educate IT staff about this vulnerability and ensure incident response plans include steps for potential exploitation scenarios. 8. Regularly review and update network device configurations to minimize exposure of management interfaces. 9. Engage with ADSLR or third-party security vendors for potential unofficial patches or workarounds. 10. Implement network-level anomaly detection to identify lateral movement or unusual activity stemming from compromised routers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T13:58:34.486Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692cebc9a0d303b752b9851e
Added to database: 12/1/2025, 1:13:45 AM
Last enriched: 12/1/2025, 1:28:23 AM
Last updated: 12/5/2025, 1:44:34 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.