Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5145: Command Injection in Netcore NBR1005GPEV2

0
Medium
VulnerabilityCVE-2025-5145cvecve-2025-5145
Published: Sun May 25 2025 (05/25/2025, 05:31:04 UTC)
Source: CVE
Vendor/Project: Netcore
Product: NBR1005GPEV2

Description

A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/16/2025, 20:59:53 UTC

Technical Analysis

CVE-2025-5145 is a command injection vulnerability identified in multiple Netcore networking devices, including models NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2, and POWER13, affecting firmware versions up to 20250508. The vulnerability exists in an unspecified component within the /www/cgi-bin/ directory, specifically in the Query String Handler, which processes HTTP query parameters. Due to insufficient input validation or sanitization, an attacker can craft malicious query strings that inject arbitrary system commands. This flaw allows remote attackers to execute commands on the underlying operating system without requiring user interaction or authentication. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. However, command injection vulnerabilities are inherently dangerous because they can lead to full system compromise, data exfiltration, or lateral movement within networks if exploited. The affected devices are typically used as wireless access points or network routers, often deployed in enterprise or ISP environments. The lack of a published patch or mitigation guidance in the provided data suggests that organizations must proactively monitor and restrict exposure of these devices to untrusted networks until updates are available.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on critical network infrastructure devices, potentially resulting in network disruption, data interception, or pivoting attacks within corporate or service provider environments. Given that these Netcore devices are often used in enterprise wireless networks or ISP deployments, successful exploitation could compromise the confidentiality and integrity of internal communications and user data. This is particularly concerning for sectors with strict data protection requirements under GDPR, such as finance, healthcare, and government agencies. Additionally, compromised network devices could be leveraged as footholds for further attacks, including ransomware or espionage campaigns. The medium CVSS score may underestimate the real-world impact if attackers chain this vulnerability with others or use it to gain persistent access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.

Mitigation Recommendations

1. Network Segmentation: Isolate affected Netcore devices from untrusted networks and limit management interface exposure to internal, secured networks only. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to restrict inbound traffic to the management interfaces of these devices. 3. Monitoring and Logging: Enable detailed logging on affected devices and monitor for unusual command execution patterns or unexpected network traffic. 4. Firmware Updates: Engage with Netcore support channels to obtain security patches or firmware updates addressing this vulnerability as soon as they become available. 5. Temporary Workarounds: If patches are unavailable, consider disabling or restricting access to the vulnerable /www/cgi-bin/ Query String Handler component if configurable. 6. Incident Response Preparedness: Prepare to isolate and remediate affected devices quickly in case of compromise. 7. Vendor Communication: Maintain active communication with Netcore for advisories and updates. 8. Inventory and Asset Management: Identify all affected devices within the organization to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-24T13:36:56.691Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6832ac820acd01a24927f709

Added to database: 5/25/2025, 5:37:06 AM

Last enriched: 7/16/2025, 8:59:53 PM

Last updated: 11/22/2025, 7:26:38 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats