CVE-2025-5147: Command Injection in Netcore NBR1005GPEV2
A vulnerability was found in Netcore NBR1005GPEV2, NBR200V2 and B6V2 up to 20250508 and classified as critical. This issue affects the function tools_ping of the file /usr/bin/network_tools. The manipulation of the argument url leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5147 is a command injection vulnerability affecting Netcore router models NBR1005GPEV2, NBR200V2, and B6V2 with firmware versions up to 20250508. The vulnerability resides in the 'tools_ping' function within the /usr/bin/network_tools executable. Specifically, the issue arises from improper sanitization of the 'url' argument, which an attacker can manipulate to inject arbitrary commands. This flaw allows remote attackers to execute arbitrary system commands on the affected device without requiring user interaction or elevated privileges, as the CVSS vector indicates low attack complexity and no authentication needed. Although the CVSS score is rated medium (5.3), the ability to execute commands remotely on network infrastructure devices like routers can have significant security implications. The vulnerability was publicly disclosed on May 25, 2025, and while no known exploits are currently reported in the wild, the public availability of the exploit code increases the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, serving as network gateways. Successful exploitation could lead to unauthorized control over network traffic, interception or modification of data, and potential pivoting to internal networks. The vulnerability does not require user interaction, increasing its risk profile. The lack of available patches at the time of disclosure further elevates the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a moderate to high risk, especially for those relying on Netcore routers in their network infrastructure. Compromise of these devices could lead to interception of sensitive communications, disruption of network availability, and unauthorized access to internal systems. Given that routers are critical for network perimeter defense, attackers exploiting this vulnerability could bypass security controls, conduct man-in-the-middle attacks, or establish persistent footholds. Organizations in sectors such as finance, healthcare, and critical infrastructure, which require stringent network security, may face increased exposure. Additionally, the medium CVSS score may underestimate the real-world impact since network devices are high-value targets. The absence of known exploits in the wild currently limits immediate widespread impact, but the public disclosure of the exploit code means threat actors could develop weaponized attacks rapidly. European organizations with limited patch management capabilities or those using affected devices without vendor support are particularly vulnerable.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Netcore devices from critical network segments to limit potential lateral movement. 2. Disable or restrict access to the vulnerable 'tools_ping' functionality if possible, or limit remote management interfaces to trusted IP addresses only. 3. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from Netcore devices. 4. Implement strict firewall rules to restrict inbound access to router management interfaces, ideally allowing only VPN or internal network access. 5. Engage with Netcore support or authorized vendors to obtain firmware updates or patches as soon as they become available. 6. If patching is delayed, consider replacing vulnerable devices with alternative hardware from vendors with active security support. 7. Conduct regular security audits and vulnerability scans focusing on network infrastructure devices to detect similar issues proactively. 8. Educate network administrators about the risks of command injection vulnerabilities and enforce strong configuration management practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-5147: Command Injection in Netcore NBR1005GPEV2
Description
A vulnerability was found in Netcore NBR1005GPEV2, NBR200V2 and B6V2 up to 20250508 and classified as critical. This issue affects the function tools_ping of the file /usr/bin/network_tools. The manipulation of the argument url leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5147 is a command injection vulnerability affecting Netcore router models NBR1005GPEV2, NBR200V2, and B6V2 with firmware versions up to 20250508. The vulnerability resides in the 'tools_ping' function within the /usr/bin/network_tools executable. Specifically, the issue arises from improper sanitization of the 'url' argument, which an attacker can manipulate to inject arbitrary commands. This flaw allows remote attackers to execute arbitrary system commands on the affected device without requiring user interaction or elevated privileges, as the CVSS vector indicates low attack complexity and no authentication needed. Although the CVSS score is rated medium (5.3), the ability to execute commands remotely on network infrastructure devices like routers can have significant security implications. The vulnerability was publicly disclosed on May 25, 2025, and while no known exploits are currently reported in the wild, the public availability of the exploit code increases the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, serving as network gateways. Successful exploitation could lead to unauthorized control over network traffic, interception or modification of data, and potential pivoting to internal networks. The vulnerability does not require user interaction, increasing its risk profile. The lack of available patches at the time of disclosure further elevates the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a moderate to high risk, especially for those relying on Netcore routers in their network infrastructure. Compromise of these devices could lead to interception of sensitive communications, disruption of network availability, and unauthorized access to internal systems. Given that routers are critical for network perimeter defense, attackers exploiting this vulnerability could bypass security controls, conduct man-in-the-middle attacks, or establish persistent footholds. Organizations in sectors such as finance, healthcare, and critical infrastructure, which require stringent network security, may face increased exposure. Additionally, the medium CVSS score may underestimate the real-world impact since network devices are high-value targets. The absence of known exploits in the wild currently limits immediate widespread impact, but the public disclosure of the exploit code means threat actors could develop weaponized attacks rapidly. European organizations with limited patch management capabilities or those using affected devices without vendor support are particularly vulnerable.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Netcore devices from critical network segments to limit potential lateral movement. 2. Disable or restrict access to the vulnerable 'tools_ping' functionality if possible, or limit remote management interfaces to trusted IP addresses only. 3. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from Netcore devices. 4. Implement strict firewall rules to restrict inbound access to router management interfaces, ideally allowing only VPN or internal network access. 5. Engage with Netcore support or authorized vendors to obtain firmware updates or patches as soon as they become available. 6. If patching is delayed, consider replacing vulnerable devices with alternative hardware from vendors with active security support. 7. Conduct regular security audits and vulnerability scans focusing on network infrastructure devices to detect similar issues proactively. 8. Educate network administrators about the risks of command injection vulnerabilities and enforce strong configuration management practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-24T13:37:03.230Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683387310acd01a24928293a
Added to database: 5/25/2025, 9:10:09 PM
Last enriched: 7/9/2025, 1:26:42 PM
Last updated: 8/17/2025, 7:52:12 PM
Views: 15
Related Threats
CVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighCVE-2025-52450: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server
HighCVE-2025-26498: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.