Skip to main content

CVE-2025-4747: Command Injection in Bohua NetDragon Firewall

Medium
VulnerabilityCVE-2025-4747cvecve-2025-4747
Published: Fri May 16 2025 (05/16/2025, 05:00:06 UTC)
Source: CVE
Vendor/Project: Bohua
Product: NetDragon Firewall

Description

A vulnerability was found in Bohua NetDragon Firewall 1.0 and classified as critical. This issue affects some unknown processing of the file /systemstatus/ip_status.php. The manipulation of the argument subnet leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 23:18:09 UTC

Technical Analysis

CVE-2025-4747 is a command injection vulnerability identified in Bohua NetDragon Firewall version 1.0. The vulnerability arises from improper handling of the 'subnet' argument within the /systemstatus/ip_status.php file. Specifically, the firewall fails to properly sanitize or validate this input, allowing an attacker to inject arbitrary commands that the system executes. This vulnerability can be exploited remotely without requiring user interaction or prior authentication, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting partial impacts on confidentiality, integrity, and availability, with low complexity and no privileges required. Although the vulnerability is classified as critical in the description, the CVSS score suggests a medium severity due to limited scope and impact. No public exploits are currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the NetDragon Firewall product by Bohua, which is a network security appliance designed to monitor and control incoming and outgoing network traffic. The command injection flaw could allow attackers to execute arbitrary system commands on the firewall device, potentially leading to unauthorized access, data leakage, disruption of firewall operations, or pivoting to internal networks. Given the firewall’s role as a security boundary, exploitation could severely undermine network defenses.

Potential Impact

For European organizations using Bohua NetDragon Firewall 1.0, this vulnerability poses a significant risk to network security. Successful exploitation could allow attackers to execute arbitrary commands on the firewall, potentially disabling or bypassing security controls, exfiltrating sensitive data, or launching further attacks within the internal network. This could lead to confidentiality breaches, integrity violations, and availability disruptions. Organizations in critical infrastructure sectors, government, finance, and telecommunications are particularly at risk due to the strategic importance of their network defenses. The remote and unauthenticated nature of the exploit increases the threat level, as attackers can target exposed firewall management interfaces over the internet or internal networks without credentials. Although no active exploitation is reported, public disclosure of the exploit details may lead to rapid weaponization. The medium CVSS score suggests partial impact, but the critical role of firewalls in security architectures means even limited compromise can have cascading effects. European entities relying on this specific firewall version should consider the potential for operational disruption and data compromise.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should verify if Bohua has released patches or newer versions addressing CVE-2025-4747 and apply them promptly. If no official patch is available, consider disabling or restricting access to the vulnerable component (/systemstatus/ip_status.php). 2. Network segmentation and access control: Limit access to the firewall management interfaces to trusted administrative networks only, using VPNs or jump hosts. 3. Input validation and filtering: If custom configurations or web application firewalls are in place, implement strict input validation rules to block malicious payloads targeting the 'subnet' parameter. 4. Monitoring and detection: Deploy intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious command injection patterns or unusual firewall behavior. 5. Incident response preparedness: Develop and test incident response plans specific to firewall compromise scenarios. 6. Vendor engagement: Engage with Bohua support for guidance and updates. 7. Alternative solutions: Evaluate the feasibility of replacing the vulnerable firewall with a more secure or updated product if patching is not timely. These steps go beyond generic advice by focusing on immediate containment, access restriction, and proactive detection tailored to the firewall’s role and the specific vulnerability vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-15T08:21:37.924Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebdaa

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 11:18:09 PM

Last updated: 8/17/2025, 7:01:21 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats