Skip to main content

CVE-2025-5145: Command Injection in Netcore NBR1005GPEV2

Medium
VulnerabilityCVE-2025-5145cvecve-2025-5145
Published: Sun May 25 2025 (05/25/2025, 05:31:04 UTC)
Source: CVE
Vendor/Project: Netcore
Product: NBR1005GPEV2

Description

A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/16/2025, 20:59:53 UTC

Technical Analysis

CVE-2025-5145 is a command injection vulnerability identified in multiple Netcore networking devices, including models NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2, and POWER13, affecting firmware versions up to 20250508. The vulnerability exists in an unspecified component within the /www/cgi-bin/ directory, specifically in the Query String Handler, which processes HTTP query parameters. Due to insufficient input validation or sanitization, an attacker can craft malicious query strings that inject arbitrary system commands. This flaw allows remote attackers to execute commands on the underlying operating system without requiring user interaction or authentication. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. However, command injection vulnerabilities are inherently dangerous because they can lead to full system compromise, data exfiltration, or lateral movement within networks if exploited. The affected devices are typically used as wireless access points or network routers, often deployed in enterprise or ISP environments. The lack of a published patch or mitigation guidance in the provided data suggests that organizations must proactively monitor and restrict exposure of these devices to untrusted networks until updates are available.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on critical network infrastructure devices, potentially resulting in network disruption, data interception, or pivoting attacks within corporate or service provider environments. Given that these Netcore devices are often used in enterprise wireless networks or ISP deployments, successful exploitation could compromise the confidentiality and integrity of internal communications and user data. This is particularly concerning for sectors with strict data protection requirements under GDPR, such as finance, healthcare, and government agencies. Additionally, compromised network devices could be leveraged as footholds for further attacks, including ransomware or espionage campaigns. The medium CVSS score may underestimate the real-world impact if attackers chain this vulnerability with others or use it to gain persistent access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.

Mitigation Recommendations

1. Network Segmentation: Isolate affected Netcore devices from untrusted networks and limit management interface exposure to internal, secured networks only. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to restrict inbound traffic to the management interfaces of these devices. 3. Monitoring and Logging: Enable detailed logging on affected devices and monitor for unusual command execution patterns or unexpected network traffic. 4. Firmware Updates: Engage with Netcore support channels to obtain security patches or firmware updates addressing this vulnerability as soon as they become available. 5. Temporary Workarounds: If patches are unavailable, consider disabling or restricting access to the vulnerable /www/cgi-bin/ Query String Handler component if configurable. 6. Incident Response Preparedness: Prepare to isolate and remediate affected devices quickly in case of compromise. 7. Vendor Communication: Maintain active communication with Netcore for advisories and updates. 8. Inventory and Asset Management: Identify all affected devices within the organization to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-24T13:36:56.691Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6832ac820acd01a24927f709

Added to database: 5/25/2025, 5:37:06 AM

Last enriched: 7/16/2025, 8:59:53 PM

Last updated: 8/4/2025, 6:36:05 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats