CVE-2025-4747: Command Injection in Bohua NetDragon Firewall
A vulnerability was found in Bohua NetDragon Firewall 1.0 and classified as critical. This issue affects some unknown processing of the file /systemstatus/ip_status.php. The manipulation of the argument subnet leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4747 is a command injection vulnerability identified in Bohua NetDragon Firewall version 1.0. The vulnerability arises from improper handling of the 'subnet' argument within the /systemstatus/ip_status.php file. Specifically, the firewall fails to properly sanitize or validate this input, allowing an attacker to inject arbitrary commands that the system executes. This vulnerability can be exploited remotely without requiring user interaction or prior authentication, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting partial impacts on confidentiality, integrity, and availability, with low complexity and no privileges required. Although the vulnerability is classified as critical in the description, the CVSS score suggests a medium severity due to limited scope and impact. No public exploits are currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the NetDragon Firewall product by Bohua, which is a network security appliance designed to monitor and control incoming and outgoing network traffic. The command injection flaw could allow attackers to execute arbitrary system commands on the firewall device, potentially leading to unauthorized access, data leakage, disruption of firewall operations, or pivoting to internal networks. Given the firewall’s role as a security boundary, exploitation could severely undermine network defenses.
Potential Impact
For European organizations using Bohua NetDragon Firewall 1.0, this vulnerability poses a significant risk to network security. Successful exploitation could allow attackers to execute arbitrary commands on the firewall, potentially disabling or bypassing security controls, exfiltrating sensitive data, or launching further attacks within the internal network. This could lead to confidentiality breaches, integrity violations, and availability disruptions. Organizations in critical infrastructure sectors, government, finance, and telecommunications are particularly at risk due to the strategic importance of their network defenses. The remote and unauthenticated nature of the exploit increases the threat level, as attackers can target exposed firewall management interfaces over the internet or internal networks without credentials. Although no active exploitation is reported, public disclosure of the exploit details may lead to rapid weaponization. The medium CVSS score suggests partial impact, but the critical role of firewalls in security architectures means even limited compromise can have cascading effects. European entities relying on this specific firewall version should consider the potential for operational disruption and data compromise.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should verify if Bohua has released patches or newer versions addressing CVE-2025-4747 and apply them promptly. If no official patch is available, consider disabling or restricting access to the vulnerable component (/systemstatus/ip_status.php). 2. Network segmentation and access control: Limit access to the firewall management interfaces to trusted administrative networks only, using VPNs or jump hosts. 3. Input validation and filtering: If custom configurations or web application firewalls are in place, implement strict input validation rules to block malicious payloads targeting the 'subnet' parameter. 4. Monitoring and detection: Deploy intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious command injection patterns or unusual firewall behavior. 5. Incident response preparedness: Develop and test incident response plans specific to firewall compromise scenarios. 6. Vendor engagement: Engage with Bohua support for guidance and updates. 7. Alternative solutions: Evaluate the feasibility of replacing the vulnerable firewall with a more secure or updated product if patching is not timely. These steps go beyond generic advice by focusing on immediate containment, access restriction, and proactive detection tailored to the firewall’s role and the specific vulnerability vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4747: Command Injection in Bohua NetDragon Firewall
Description
A vulnerability was found in Bohua NetDragon Firewall 1.0 and classified as critical. This issue affects some unknown processing of the file /systemstatus/ip_status.php. The manipulation of the argument subnet leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4747 is a command injection vulnerability identified in Bohua NetDragon Firewall version 1.0. The vulnerability arises from improper handling of the 'subnet' argument within the /systemstatus/ip_status.php file. Specifically, the firewall fails to properly sanitize or validate this input, allowing an attacker to inject arbitrary commands that the system executes. This vulnerability can be exploited remotely without requiring user interaction or prior authentication, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting partial impacts on confidentiality, integrity, and availability, with low complexity and no privileges required. Although the vulnerability is classified as critical in the description, the CVSS score suggests a medium severity due to limited scope and impact. No public exploits are currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the NetDragon Firewall product by Bohua, which is a network security appliance designed to monitor and control incoming and outgoing network traffic. The command injection flaw could allow attackers to execute arbitrary system commands on the firewall device, potentially leading to unauthorized access, data leakage, disruption of firewall operations, or pivoting to internal networks. Given the firewall’s role as a security boundary, exploitation could severely undermine network defenses.
Potential Impact
For European organizations using Bohua NetDragon Firewall 1.0, this vulnerability poses a significant risk to network security. Successful exploitation could allow attackers to execute arbitrary commands on the firewall, potentially disabling or bypassing security controls, exfiltrating sensitive data, or launching further attacks within the internal network. This could lead to confidentiality breaches, integrity violations, and availability disruptions. Organizations in critical infrastructure sectors, government, finance, and telecommunications are particularly at risk due to the strategic importance of their network defenses. The remote and unauthenticated nature of the exploit increases the threat level, as attackers can target exposed firewall management interfaces over the internet or internal networks without credentials. Although no active exploitation is reported, public disclosure of the exploit details may lead to rapid weaponization. The medium CVSS score suggests partial impact, but the critical role of firewalls in security architectures means even limited compromise can have cascading effects. European entities relying on this specific firewall version should consider the potential for operational disruption and data compromise.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should verify if Bohua has released patches or newer versions addressing CVE-2025-4747 and apply them promptly. If no official patch is available, consider disabling or restricting access to the vulnerable component (/systemstatus/ip_status.php). 2. Network segmentation and access control: Limit access to the firewall management interfaces to trusted administrative networks only, using VPNs or jump hosts. 3. Input validation and filtering: If custom configurations or web application firewalls are in place, implement strict input validation rules to block malicious payloads targeting the 'subnet' parameter. 4. Monitoring and detection: Deploy intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious command injection patterns or unusual firewall behavior. 5. Incident response preparedness: Develop and test incident response plans specific to firewall compromise scenarios. 6. Vendor engagement: Engage with Bohua support for guidance and updates. 7. Alternative solutions: Evaluate the feasibility of replacing the vulnerable firewall with a more secure or updated product if patching is not timely. These steps go beyond generic advice by focusing on immediate containment, access restriction, and proactive detection tailored to the firewall’s role and the specific vulnerability vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T08:21:37.924Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdaa
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:18:09 PM
Last updated: 8/17/2025, 7:01:21 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.