CVE-2025-13800: Command Injection in ADSLR NBR1005GPEV2
A vulnerability was found in ADSLR NBR1005GPEV2 250814-r037c. This issue affects the function set_mesh_disconnect of the file /send_order.cgi. The manipulation of the argument mac results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13800 identifies a command injection vulnerability in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the set_mesh_disconnect function of the /send_order.cgi endpoint, where the mac parameter is improperly sanitized, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability by enabling attackers to execute arbitrary commands, potentially leading to full device compromise, unauthorized network access, or denial of service. The vendor was notified but has not responded or issued patches, and while no known exploits are currently active in the wild, exploit code has been publicly disclosed, increasing the risk of future attacks. The vulnerability affects a specific firmware version, so devices running this version or earlier are vulnerable. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls. The vulnerability's medium CVSS score (5.3) reflects the balance between ease of exploitation and the requirement for some privileges (PR:L) but no user interaction or complex attack conditions. This vulnerability is particularly concerning for environments where these routers serve as critical network infrastructure or connect sensitive systems.
Potential Impact
For European organizations, exploitation of CVE-2025-13800 could lead to unauthorized command execution on vulnerable ADSLR NBR1005GPEV2 routers, resulting in device takeover, network disruption, or pivoting to internal systems. This could compromise confidentiality by exposing sensitive network traffic or credentials, integrity by altering device configurations or firmware, and availability by causing denial of service. Organizations relying on these routers for mesh networking or critical connectivity may experience operational outages or data breaches. The absence of vendor patches increases exposure duration, and public exploit availability raises the likelihood of targeted attacks. Industries with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) could face compliance violations and reputational damage. The threat is amplified in environments with limited network segmentation or weak monitoring, enabling attackers to move laterally once inside the network. European entities with remote management enabled on these devices are particularly at risk due to the remote exploitability without authentication.
Mitigation Recommendations
1. Immediately identify and inventory all ADSLR NBR1005GPEV2 devices running firmware version 250814-r037c or earlier. 2. Disable remote management interfaces and any unnecessary services, especially those exposing /send_order.cgi endpoints. 3. Implement strict network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Monitor network traffic for unusual commands or activity targeting the mac parameter or /send_order.cgi endpoint. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for known exploit patterns related to this vulnerability. 6. Restrict access to router management interfaces to trusted IP addresses only. 7. Regularly check for vendor updates or patches and apply them promptly once available. 8. Consider replacing vulnerable devices with alternative hardware if patches are not forthcoming. 9. Conduct security awareness training for network administrators to recognize signs of exploitation. 10. Maintain up-to-date backups of router configurations to enable rapid recovery if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-13800: Command Injection in ADSLR NBR1005GPEV2
Description
A vulnerability was found in ADSLR NBR1005GPEV2 250814-r037c. This issue affects the function set_mesh_disconnect of the file /send_order.cgi. The manipulation of the argument mac results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13800 identifies a command injection vulnerability in the ADSLR NBR1005GPEV2 router firmware version 250814-r037c. The vulnerability resides in the set_mesh_disconnect function of the /send_order.cgi endpoint, where the mac parameter is improperly sanitized, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability by enabling attackers to execute arbitrary commands, potentially leading to full device compromise, unauthorized network access, or denial of service. The vendor was notified but has not responded or issued patches, and while no known exploits are currently active in the wild, exploit code has been publicly disclosed, increasing the risk of future attacks. The vulnerability affects a specific firmware version, so devices running this version or earlier are vulnerable. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls. The vulnerability's medium CVSS score (5.3) reflects the balance between ease of exploitation and the requirement for some privileges (PR:L) but no user interaction or complex attack conditions. This vulnerability is particularly concerning for environments where these routers serve as critical network infrastructure or connect sensitive systems.
Potential Impact
For European organizations, exploitation of CVE-2025-13800 could lead to unauthorized command execution on vulnerable ADSLR NBR1005GPEV2 routers, resulting in device takeover, network disruption, or pivoting to internal systems. This could compromise confidentiality by exposing sensitive network traffic or credentials, integrity by altering device configurations or firmware, and availability by causing denial of service. Organizations relying on these routers for mesh networking or critical connectivity may experience operational outages or data breaches. The absence of vendor patches increases exposure duration, and public exploit availability raises the likelihood of targeted attacks. Industries with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) could face compliance violations and reputational damage. The threat is amplified in environments with limited network segmentation or weak monitoring, enabling attackers to move laterally once inside the network. European entities with remote management enabled on these devices are particularly at risk due to the remote exploitability without authentication.
Mitigation Recommendations
1. Immediately identify and inventory all ADSLR NBR1005GPEV2 devices running firmware version 250814-r037c or earlier. 2. Disable remote management interfaces and any unnecessary services, especially those exposing /send_order.cgi endpoints. 3. Implement strict network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Monitor network traffic for unusual commands or activity targeting the mac parameter or /send_order.cgi endpoint. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for known exploit patterns related to this vulnerability. 6. Restrict access to router management interfaces to trusted IP addresses only. 7. Regularly check for vendor updates or patches and apply them promptly once available. 8. Consider replacing vulnerable devices with alternative hardware if patches are not forthcoming. 9. Conduct security awareness training for network administrators to recognize signs of exploitation. 10. Maintain up-to-date backups of router configurations to enable rapid recovery if compromise occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T13:58:37.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692d142cfcc4df0b650cf5bb
Added to database: 12/1/2025, 4:06:04 AM
Last enriched: 12/8/2025, 4:28:13 AM
Last updated: 1/19/2026, 7:58:10 AM
Views: 125
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.