Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33181: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in NVIDIA Cumulus Linux GA

0
High
VulnerabilityCVE-2025-33181cvecve-2025-33181cwe-77
Published: Tue Feb 24 2026 (02/24/2026, 18:42:04 UTC)
Source: CVE Database V5
Vendor/Project: NVIDIA
Product: Cumulus Linux GA

Description

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:50:55 UTC

Technical Analysis

CVE-2025-33181 is a command injection vulnerability classified under CWE-77, found in the NVUE interface of NVIDIA Cumulus Linux GA and NVOS products. The vulnerability allows a low-privileged user to inject arbitrary commands due to improper neutralization of special elements in command inputs. This flaw exists in all versions prior to 5.14, including 5.13.x and 5.12.x. The NVUE interface, which is used for network device management, fails to properly sanitize user-supplied input, enabling an attacker with limited privileges to execute arbitrary commands on the underlying system. Exploitation requires local access and some user interaction, such as submitting crafted input through the NVUE interface. Successful exploitation results in escalation of privileges, potentially granting the attacker root or administrative control over the device. This can lead to full compromise of the network device, allowing attackers to manipulate network traffic, disrupt services, or pivot to other network segments. The vulnerability has a CVSS v3.1 base score of 7.3, indicating high severity with high impact on confidentiality, integrity, and availability, moderate attack complexity, and requiring low privileges and user interaction. No public exploits or active exploitation have been reported yet. The vulnerability was reserved in April 2025 and published in February 2026. NVIDIA has not yet provided patch links, so mitigation may rely on workarounds or upgrading to version 5.14 once available.

Potential Impact

The impact of CVE-2025-33181 is significant for organizations relying on NVIDIA Cumulus Linux for network infrastructure, including data centers, cloud providers, and large enterprises. Successful exploitation can lead to full system compromise of network devices, enabling attackers to intercept, modify, or disrupt network traffic, potentially causing widespread service outages or data breaches. Privilege escalation from a low-privileged user to root can allow attackers to install persistent backdoors, manipulate routing protocols, or disable security controls. This undermines the confidentiality, integrity, and availability of critical network operations. Given the role of Cumulus Linux in modern data center networking, the vulnerability poses risks to cloud service providers, telecommunications companies, and enterprises with large-scale network deployments. The lack of known exploits reduces immediate risk, but the high severity and potential impact necessitate urgent attention. Organizations failing to address this vulnerability may face increased risk of targeted attacks, especially in environments where local user access is possible.

Mitigation Recommendations

Organizations should prioritize upgrading NVIDIA Cumulus Linux installations to version 5.14 or later once patches are released. Until then, implement strict access controls to limit local user access to the NVUE interface, ensuring only trusted administrators can interact with it. Employ network segmentation to isolate management interfaces from general user networks, reducing the attack surface. Monitor logs and system behavior for unusual command execution or privilege escalation attempts. Disable or restrict NVUE interface usage if feasible in the short term. Use host-based intrusion detection systems (HIDS) to detect anomalous command injection patterns. Regularly audit user privileges and remove unnecessary local accounts. Coordinate with NVIDIA support for any available interim patches or recommended configuration changes. Finally, incorporate this vulnerability into incident response plans to enable rapid detection and containment if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
nvidia
Date Reserved
2025-04-15T18:51:02.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699df93ebe58cf853b1d7e81

Added to database: 2/24/2026, 7:17:18 PM

Last enriched: 3/4/2026, 1:50:55 AM

Last updated: 4/9/2026, 3:28:51 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses