Skip to main content

CVE-2025-5147: Command Injection in Netcore NBR1005GPEV2

Medium
VulnerabilityCVE-2025-5147cvecve-2025-5147
Published: Sun May 25 2025 (05/25/2025, 11:31:04 UTC)
Source: CVE
Vendor/Project: Netcore
Product: NBR1005GPEV2

Description

A vulnerability was found in Netcore NBR1005GPEV2, NBR200V2 and B6V2 up to 20250508 and classified as critical. This issue affects the function tools_ping of the file /usr/bin/network_tools. The manipulation of the argument url leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:26:42 UTC

Technical Analysis

CVE-2025-5147 is a command injection vulnerability affecting Netcore router models NBR1005GPEV2, NBR200V2, and B6V2 with firmware versions up to 20250508. The vulnerability resides in the 'tools_ping' function within the /usr/bin/network_tools executable. Specifically, the issue arises from improper sanitization of the 'url' argument, which an attacker can manipulate to inject arbitrary commands. This flaw allows remote attackers to execute arbitrary system commands on the affected device without requiring user interaction or elevated privileges, as the CVSS vector indicates low attack complexity and no authentication needed. Although the CVSS score is rated medium (5.3), the ability to execute commands remotely on network infrastructure devices like routers can have significant security implications. The vulnerability was publicly disclosed on May 25, 2025, and while no known exploits are currently reported in the wild, the public availability of the exploit code increases the risk of exploitation. The affected devices are commonly used in small to medium enterprise and residential environments, serving as network gateways. Successful exploitation could lead to unauthorized control over network traffic, interception or modification of data, and potential pivoting to internal networks. The vulnerability does not require user interaction, increasing its risk profile. The lack of available patches at the time of disclosure further elevates the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a moderate to high risk, especially for those relying on Netcore routers in their network infrastructure. Compromise of these devices could lead to interception of sensitive communications, disruption of network availability, and unauthorized access to internal systems. Given that routers are critical for network perimeter defense, attackers exploiting this vulnerability could bypass security controls, conduct man-in-the-middle attacks, or establish persistent footholds. Organizations in sectors such as finance, healthcare, and critical infrastructure, which require stringent network security, may face increased exposure. Additionally, the medium CVSS score may underestimate the real-world impact since network devices are high-value targets. The absence of known exploits in the wild currently limits immediate widespread impact, but the public disclosure of the exploit code means threat actors could develop weaponized attacks rapidly. European organizations with limited patch management capabilities or those using affected devices without vendor support are particularly vulnerable.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected Netcore devices from critical network segments to limit potential lateral movement. 2. Disable or restrict access to the vulnerable 'tools_ping' functionality if possible, or limit remote management interfaces to trusted IP addresses only. 3. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from Netcore devices. 4. Implement strict firewall rules to restrict inbound access to router management interfaces, ideally allowing only VPN or internal network access. 5. Engage with Netcore support or authorized vendors to obtain firmware updates or patches as soon as they become available. 6. If patching is delayed, consider replacing vulnerable devices with alternative hardware from vendors with active security support. 7. Conduct regular security audits and vulnerability scans focusing on network infrastructure devices to detect similar issues proactively. 8. Educate network administrators about the risks of command injection vulnerabilities and enforce strong configuration management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-24T13:37:03.230Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683387310acd01a24928293a

Added to database: 5/25/2025, 9:10:09 PM

Last enriched: 7/9/2025, 1:26:42 PM

Last updated: 8/17/2025, 7:52:12 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats