CVE-2025-5145: Command Injection in Netcore NBR1005GPEV2
A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5145 is a command injection vulnerability identified in multiple Netcore networking devices, including models NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2, and POWER13, affecting firmware versions up to 20250508. The vulnerability exists in an unspecified component within the /www/cgi-bin/ directory, specifically in the Query String Handler, which processes HTTP query parameters. Due to insufficient input validation or sanitization, an attacker can craft malicious query strings that inject arbitrary system commands. This flaw allows remote attackers to execute commands on the underlying operating system without requiring user interaction or authentication. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. However, command injection vulnerabilities are inherently dangerous because they can lead to full system compromise, data exfiltration, or lateral movement within networks if exploited. The affected devices are typically used as wireless access points or network routers, often deployed in enterprise or ISP environments. The lack of a published patch or mitigation guidance in the provided data suggests that organizations must proactively monitor and restrict exposure of these devices to untrusted networks until updates are available.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on critical network infrastructure devices, potentially resulting in network disruption, data interception, or pivoting attacks within corporate or service provider environments. Given that these Netcore devices are often used in enterprise wireless networks or ISP deployments, successful exploitation could compromise the confidentiality and integrity of internal communications and user data. This is particularly concerning for sectors with strict data protection requirements under GDPR, such as finance, healthcare, and government agencies. Additionally, compromised network devices could be leveraged as footholds for further attacks, including ransomware or espionage campaigns. The medium CVSS score may underestimate the real-world impact if attackers chain this vulnerability with others or use it to gain persistent access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.
Mitigation Recommendations
1. Network Segmentation: Isolate affected Netcore devices from untrusted networks and limit management interface exposure to internal, secured networks only. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to restrict inbound traffic to the management interfaces of these devices. 3. Monitoring and Logging: Enable detailed logging on affected devices and monitor for unusual command execution patterns or unexpected network traffic. 4. Firmware Updates: Engage with Netcore support channels to obtain security patches or firmware updates addressing this vulnerability as soon as they become available. 5. Temporary Workarounds: If patches are unavailable, consider disabling or restricting access to the vulnerable /www/cgi-bin/ Query String Handler component if configurable. 6. Incident Response Preparedness: Prepare to isolate and remediate affected devices quickly in case of compromise. 7. Vendor Communication: Maintain active communication with Netcore for advisories and updates. 8. Inventory and Asset Management: Identify all affected devices within the organization to prioritize remediation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5145: Command Injection in Netcore NBR1005GPEV2
Description
A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5145 is a command injection vulnerability identified in multiple Netcore networking devices, including models NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2, and POWER13, affecting firmware versions up to 20250508. The vulnerability exists in an unspecified component within the /www/cgi-bin/ directory, specifically in the Query String Handler, which processes HTTP query parameters. Due to insufficient input validation or sanitization, an attacker can craft malicious query strings that inject arbitrary system commands. This flaw allows remote attackers to execute commands on the underlying operating system without requiring user interaction or authentication. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. However, command injection vulnerabilities are inherently dangerous because they can lead to full system compromise, data exfiltration, or lateral movement within networks if exploited. The affected devices are typically used as wireless access points or network routers, often deployed in enterprise or ISP environments. The lack of a published patch or mitigation guidance in the provided data suggests that organizations must proactively monitor and restrict exposure of these devices to untrusted networks until updates are available.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on critical network infrastructure devices, potentially resulting in network disruption, data interception, or pivoting attacks within corporate or service provider environments. Given that these Netcore devices are often used in enterprise wireless networks or ISP deployments, successful exploitation could compromise the confidentiality and integrity of internal communications and user data. This is particularly concerning for sectors with strict data protection requirements under GDPR, such as finance, healthcare, and government agencies. Additionally, compromised network devices could be leveraged as footholds for further attacks, including ransomware or espionage campaigns. The medium CVSS score may underestimate the real-world impact if attackers chain this vulnerability with others or use it to gain persistent access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.
Mitigation Recommendations
1. Network Segmentation: Isolate affected Netcore devices from untrusted networks and limit management interface exposure to internal, secured networks only. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to restrict inbound traffic to the management interfaces of these devices. 3. Monitoring and Logging: Enable detailed logging on affected devices and monitor for unusual command execution patterns or unexpected network traffic. 4. Firmware Updates: Engage with Netcore support channels to obtain security patches or firmware updates addressing this vulnerability as soon as they become available. 5. Temporary Workarounds: If patches are unavailable, consider disabling or restricting access to the vulnerable /www/cgi-bin/ Query String Handler component if configurable. 6. Incident Response Preparedness: Prepare to isolate and remediate affected devices quickly in case of compromise. 7. Vendor Communication: Maintain active communication with Netcore for advisories and updates. 8. Inventory and Asset Management: Identify all affected devices within the organization to prioritize remediation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-24T13:36:56.691Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6832ac820acd01a24927f709
Added to database: 5/25/2025, 5:37:06 AM
Last enriched: 7/16/2025, 8:59:53 PM
Last updated: 8/4/2025, 6:36:05 AM
Views: 16
Related Threats
CVE-2025-6715: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LatePoint
UnknownCVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms
CriticalCVE-2025-8491: CWE-352 Cross-Site Request Forgery (CSRF) in nikelschubert Easy restaurant menu manager
MediumCVE-2025-0818: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ninjateam File Manager Pro – Filester
MediumCVE-2025-8901: Out of bounds write in Google Chrome
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.