Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26063: n/a

0
Critical
VulnerabilityCVE-2025-26063cvecve-2025-26063
Published: Thu Jul 31 2025 (07/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into the ESSID name when creating a network.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:24:46 UTC

Technical Analysis

CVE-2025-26063 is a critical vulnerability identified in Intelbras RX1500 version 2.2.9 and RX3000 version 1.0.11 devices. The flaw stems from improper input validation of the ESSID name field when creating a wireless network. An attacker can craft a malicious ESSID payload that, when processed by the device, triggers arbitrary code execution without requiring authentication or user interaction. This vulnerability is categorized under CWE-77, indicating a command injection weakness. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), resulting in a CVSS v3.1 base score of 9.8, denoting critical severity. Exploitation could allow attackers to fully compromise the device, leading to data theft, network disruption, or pivoting to internal networks. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a high-risk threat. Intelbras devices are commonly used in small to medium enterprise and residential environments, often in Latin America and some European markets. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.

Potential Impact

For European organizations, exploitation of CVE-2025-26063 could result in complete compromise of affected Intelbras devices, leading to unauthorized access to internal networks, data exfiltration, and disruption of network services. The vulnerability threatens confidentiality by enabling attackers to access sensitive information, integrity by allowing modification of device configurations or network traffic, and availability by potentially causing device crashes or denial of service. Given the devices' role as network access points or routers, attackers could use compromised devices as footholds to launch further attacks within corporate or residential networks. This is particularly concerning for organizations relying on Intelbras hardware for critical communications or in environments with limited network segmentation. The absence of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation if devices are exposed to untrusted networks.

Mitigation Recommendations

1. Immediately restrict access to Intelbras RX1500 and RX3000 device management interfaces by implementing network segmentation and firewall rules to limit exposure to untrusted networks. 2. Monitor wireless network configurations for unusual or suspicious ESSID names that could indicate attempted exploitation. 3. Disable automatic network creation features if possible or enforce strict input validation policies on ESSID names. 4. Engage with Intelbras support channels to obtain and apply security patches or firmware updates as soon as they become available. 5. Employ network intrusion detection systems (NIDS) capable of detecting anomalous wireless management frames or command injection attempts. 6. Conduct regular security audits and vulnerability assessments on network infrastructure to identify and remediate vulnerable devices. 7. Educate network administrators about this vulnerability and the importance of promptly applying mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688bbde8ad5a09ad00bba878

Added to database: 7/31/2025, 7:03:04 PM

Last enriched: 11/4/2025, 2:24:46 AM

Last updated: 12/4/2025, 9:45:05 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats