CVE-2025-5146: Command Injection in Netcore NBR1005GPEV2
A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5146 is a command injection vulnerability identified in multiple Netcore router models, including NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, and NBR200V2, affecting firmware versions up to 20250508. The vulnerability resides in the passwd_set function within the /usr/bin/routerd binary, specifically in the HTTP Header Handler component. An attacker can manipulate the 'pwd' argument to inject arbitrary commands, which the router executes with elevated privileges. This flaw allows remote attackers to execute arbitrary commands on the device without requiring authentication or user interaction, as the attack vector is network-based (AV:N) and the attack complexity is low (AC:L). The CVSS 4.0 base score is 5.3, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, making them attractive targets for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromised routers can lead to unauthorized access to internal networks, data exfiltration, and disruption of services. Given that these Netcore devices are often deployed in office environments and branch locations, exploitation could facilitate lateral movement by attackers, undermining confidentiality and integrity of sensitive corporate data. Additionally, attackers could leverage compromised routers to launch further attacks, including man-in-the-middle, DNS hijacking, or as part of botnets for distributed denial-of-service (DDoS) campaigns. The medium severity score reflects partial but meaningful impacts on confidentiality, integrity, and availability, which can translate into financial losses, reputational damage, and regulatory non-compliance under GDPR if personal data is affected. The remote and unauthenticated nature of the exploit increases the urgency for European organizations to address this vulnerability promptly.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify the presence of affected Netcore router models and firmware versions. In the absence of an official patch, network administrators should implement compensating controls such as restricting remote management access to trusted IP addresses via firewall rules, disabling HTTP management interfaces if not required, or switching to secure management protocols like SSH or VPN-based access. Network segmentation should be enforced to isolate vulnerable devices from critical systems. Continuous monitoring for unusual network traffic or command execution patterns on these devices is recommended. Additionally, organizations should engage with Netcore support channels to obtain firmware updates or security advisories and apply patches as soon as they become available. Regular backups of router configurations and a tested incident response plan will aid in rapid recovery if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-5146: Command Injection in Netcore NBR1005GPEV2
Description
A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5146 is a command injection vulnerability identified in multiple Netcore router models, including NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, and NBR200V2, affecting firmware versions up to 20250508. The vulnerability resides in the passwd_set function within the /usr/bin/routerd binary, specifically in the HTTP Header Handler component. An attacker can manipulate the 'pwd' argument to inject arbitrary commands, which the router executes with elevated privileges. This flaw allows remote attackers to execute arbitrary commands on the device without requiring authentication or user interaction, as the attack vector is network-based (AV:N) and the attack complexity is low (AC:L). The CVSS 4.0 base score is 5.3, indicating medium severity, with partial impacts on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, making them attractive targets for attackers seeking to compromise network infrastructure or pivot into internal networks. The lack of available patches at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromised routers can lead to unauthorized access to internal networks, data exfiltration, and disruption of services. Given that these Netcore devices are often deployed in office environments and branch locations, exploitation could facilitate lateral movement by attackers, undermining confidentiality and integrity of sensitive corporate data. Additionally, attackers could leverage compromised routers to launch further attacks, including man-in-the-middle, DNS hijacking, or as part of botnets for distributed denial-of-service (DDoS) campaigns. The medium severity score reflects partial but meaningful impacts on confidentiality, integrity, and availability, which can translate into financial losses, reputational damage, and regulatory non-compliance under GDPR if personal data is affected. The remote and unauthenticated nature of the exploit increases the urgency for European organizations to address this vulnerability promptly.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify the presence of affected Netcore router models and firmware versions. In the absence of an official patch, network administrators should implement compensating controls such as restricting remote management access to trusted IP addresses via firewall rules, disabling HTTP management interfaces if not required, or switching to secure management protocols like SSH or VPN-based access. Network segmentation should be enforced to isolate vulnerable devices from critical systems. Continuous monitoring for unusual network traffic or command execution patterns on these devices is recommended. Additionally, organizations should engage with Netcore support channels to obtain firmware updates or security advisories and apply patches as soon as they become available. Regular backups of router configurations and a tested incident response plan will aid in rapid recovery if exploitation occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-24T13:36:59.953Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6832c1b90acd01a24927fbf0
Added to database: 5/25/2025, 7:07:37 AM
Last enriched: 7/9/2025, 1:10:31 AM
Last updated: 8/6/2025, 8:41:46 PM
Views: 15
Related Threats
CVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.