CVE-2025-5146: Command Injection in Netcore NBR1005GPEV2
A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5146 is a command injection vulnerability identified in multiple Netcore router models, including NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, and NBR200V2, affecting firmware versions up to 20250508. The vulnerability resides in the passwd_set function within the /usr/bin/routerd binary, specifically in the HTTP Header Handler component. An attacker can manipulate the 'pwd' argument to inject arbitrary commands, which the router executes with elevated privileges. This flaw allows remote attackers to execute arbitrary commands on the device without requiring authentication or user interaction, as the attack vector is network-based (AV:N) and the attack complexity is low (AC:L). The CVSS 4.0 base score is 5.3, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, making them attractive targets for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromised routers can lead to unauthorized access to internal networks, data exfiltration, and disruption of services. Given that these Netcore devices are often deployed in office environments and branch locations, exploitation could facilitate lateral movement by attackers, undermining confidentiality and integrity of sensitive corporate data. Additionally, attackers could leverage compromised routers to launch further attacks, including man-in-the-middle, DNS hijacking, or as part of botnets for distributed denial-of-service (DDoS) campaigns. The medium severity score reflects partial but meaningful impacts on confidentiality, integrity, and availability, which can translate into financial losses, reputational damage, and regulatory non-compliance under GDPR if personal data is affected. The remote and unauthenticated nature of the exploit increases the urgency for European organizations to address this vulnerability promptly.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify the presence of affected Netcore router models and firmware versions. In the absence of an official patch, network administrators should implement compensating controls such as restricting remote management access to trusted IP addresses via firewall rules, disabling HTTP management interfaces if not required, or switching to secure management protocols like SSH or VPN-based access. Network segmentation should be enforced to isolate vulnerable devices from critical systems. Continuous monitoring for unusual network traffic or command execution patterns on these devices is recommended. Additionally, organizations should engage with Netcore support channels to obtain firmware updates or security advisories and apply patches as soon as they become available. Regular backups of router configurations and a tested incident response plan will aid in rapid recovery if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-5146: Command Injection in Netcore NBR1005GPEV2
Description
A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5146 is a command injection vulnerability identified in multiple Netcore router models, including NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, and NBR200V2, affecting firmware versions up to 20250508. The vulnerability resides in the passwd_set function within the /usr/bin/routerd binary, specifically in the HTTP Header Handler component. An attacker can manipulate the 'pwd' argument to inject arbitrary commands, which the router executes with elevated privileges. This flaw allows remote attackers to execute arbitrary commands on the device without requiring authentication or user interaction, as the attack vector is network-based (AV:N) and the attack complexity is low (AC:L). The CVSS 4.0 base score is 5.3, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, making them attractive targets for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromised routers can lead to unauthorized access to internal networks, data exfiltration, and disruption of services. Given that these Netcore devices are often deployed in office environments and branch locations, exploitation could facilitate lateral movement by attackers, undermining confidentiality and integrity of sensitive corporate data. Additionally, attackers could leverage compromised routers to launch further attacks, including man-in-the-middle, DNS hijacking, or as part of botnets for distributed denial-of-service (DDoS) campaigns. The medium severity score reflects partial but meaningful impacts on confidentiality, integrity, and availability, which can translate into financial losses, reputational damage, and regulatory non-compliance under GDPR if personal data is affected. The remote and unauthenticated nature of the exploit increases the urgency for European organizations to address this vulnerability promptly.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify the presence of affected Netcore router models and firmware versions. In the absence of an official patch, network administrators should implement compensating controls such as restricting remote management access to trusted IP addresses via firewall rules, disabling HTTP management interfaces if not required, or switching to secure management protocols like SSH or VPN-based access. Network segmentation should be enforced to isolate vulnerable devices from critical systems. Continuous monitoring for unusual network traffic or command execution patterns on these devices is recommended. Additionally, organizations should engage with Netcore support channels to obtain firmware updates or security advisories and apply patches as soon as they become available. Regular backups of router configurations and a tested incident response plan will aid in rapid recovery if exploitation occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-24T13:36:59.953Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6832c1b90acd01a24927fbf0
Added to database: 5/25/2025, 7:07:37 AM
Last enriched: 7/9/2025, 1:10:31 AM
Last updated: 10/7/2025, 1:53:03 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.