CVE-2025-13800: Command Injection in ADSLR NBR1005GPEV2
A vulnerability was found in ADSLR NBR1005GPEV2 250814-r037c. This issue affects the function set_mesh_disconnect of the file /send_order.cgi. The manipulation of the argument mac results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13800 is a command injection vulnerability identified in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the set_mesh_disconnect function of the /send_order.cgi endpoint, where the mac parameter is insufficiently sanitized, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without requiring authentication or user interaction, increasing the risk of widespread exploitation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to the lack of privilege requirements but limited impact scope. The exploit enables attackers to execute arbitrary commands on the device, potentially leading to full device compromise, unauthorized configuration changes, or denial of service. The vendor was notified early but has not issued any patches or advisories, and no official remediation is available. Public exploit code has been released, increasing the risk of exploitation by malicious actors. The vulnerability affects a specific firmware version, so organizations using this version are at risk. The lack of authentication and remote exploitability make this a significant threat to network security, especially in environments where these routers serve as critical network nodes or gateways.
Potential Impact
For European organizations, this vulnerability poses risks including unauthorized remote control of network routers, leading to potential interception or manipulation of network traffic, disruption of network services, and compromise of internal network integrity. Organizations relying on ADSLR NBR1005GPEV2 devices in their infrastructure could experience outages or breaches, impacting confidentiality, integrity, and availability of their networks. Critical sectors such as telecommunications, government, and enterprises with mesh network deployments are particularly vulnerable. The absence of vendor patches and public exploit availability increase the likelihood of exploitation attempts. Attackers could leverage this vulnerability to pivot into internal networks, escalate privileges, or launch further attacks. The medium severity rating suggests moderate but tangible risks, especially if exploited in large-scale or targeted attacks. The impact is amplified in environments where these routers are deployed at network perimeters or in sensitive operational contexts.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement immediate compensating controls. These include isolating affected devices from untrusted networks, restricting remote access to management interfaces, and disabling mesh networking features if feasible. Network segmentation should be enforced to limit lateral movement from compromised devices. Continuous monitoring for unusual command execution or network behavior related to the /send_order.cgi endpoint is critical. Employing intrusion detection systems with signatures for known exploit patterns can help detect exploitation attempts. Organizations should inventory their network devices to identify affected firmware versions and prioritize replacement or firmware upgrades once available. Engaging with ADSLR or third-party security providers for custom mitigation or firmware updates is advisable. Additionally, applying strict firewall rules to block unauthorized access to router management ports and educating network administrators about this vulnerability will reduce risk exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13800: Command Injection in ADSLR NBR1005GPEV2
Description
A vulnerability was found in ADSLR NBR1005GPEV2 250814-r037c. This issue affects the function set_mesh_disconnect of the file /send_order.cgi. The manipulation of the argument mac results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13800 is a command injection vulnerability identified in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the set_mesh_disconnect function of the /send_order.cgi endpoint, where the mac parameter is insufficiently sanitized, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without requiring authentication or user interaction, increasing the risk of widespread exploitation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to the lack of privilege requirements but limited impact scope. The exploit enables attackers to execute arbitrary commands on the device, potentially leading to full device compromise, unauthorized configuration changes, or denial of service. The vendor was notified early but has not issued any patches or advisories, and no official remediation is available. Public exploit code has been released, increasing the risk of exploitation by malicious actors. The vulnerability affects a specific firmware version, so organizations using this version are at risk. The lack of authentication and remote exploitability make this a significant threat to network security, especially in environments where these routers serve as critical network nodes or gateways.
Potential Impact
For European organizations, this vulnerability poses risks including unauthorized remote control of network routers, leading to potential interception or manipulation of network traffic, disruption of network services, and compromise of internal network integrity. Organizations relying on ADSLR NBR1005GPEV2 devices in their infrastructure could experience outages or breaches, impacting confidentiality, integrity, and availability of their networks. Critical sectors such as telecommunications, government, and enterprises with mesh network deployments are particularly vulnerable. The absence of vendor patches and public exploit availability increase the likelihood of exploitation attempts. Attackers could leverage this vulnerability to pivot into internal networks, escalate privileges, or launch further attacks. The medium severity rating suggests moderate but tangible risks, especially if exploited in large-scale or targeted attacks. The impact is amplified in environments where these routers are deployed at network perimeters or in sensitive operational contexts.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement immediate compensating controls. These include isolating affected devices from untrusted networks, restricting remote access to management interfaces, and disabling mesh networking features if feasible. Network segmentation should be enforced to limit lateral movement from compromised devices. Continuous monitoring for unusual command execution or network behavior related to the /send_order.cgi endpoint is critical. Employing intrusion detection systems with signatures for known exploit patterns can help detect exploitation attempts. Organizations should inventory their network devices to identify affected firmware versions and prioritize replacement or firmware upgrades once available. Engaging with ADSLR or third-party security providers for custom mitigation or firmware updates is advisable. Additionally, applying strict firewall rules to block unauthorized access to router management ports and educating network administrators about this vulnerability will reduce risk exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T13:58:37.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692d142cfcc4df0b650cf5bb
Added to database: 12/1/2025, 4:06:04 AM
Last enriched: 12/1/2025, 4:06:27 AM
Last updated: 12/5/2025, 1:28:30 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.