Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55048: Multiple CWE-78 in Baicells NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, NOVA227

0
Critical
VulnerabilityCVE-2025-55048cvecve-2025-55048cwe-78
Published: Tue Sep 09 2025 (09/09/2025, 18:45:42 UTC)
Source: CVE Database V5
Vendor/Project: Baicells
Product: NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, NOVA227

Description

Multiple CWE-78

AI-Powered Analysis

AILast updated: 09/17/2025, 00:58:22 UTC

Technical Analysis

CVE-2025-55048 is a critical security vulnerability affecting multiple Baicells products, including NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, and NOVA227. The vulnerability is classified under CWE-78, which corresponds to OS Command Injection. This type of vulnerability allows an attacker to execute arbitrary operating system commands on the affected device. The affected versions include several releases of Baicells' BaiBS_RTS and BaiBS_RTD firmware, specifically versions 3.6.6 through 3.7.11.16 and 3.7.11.6 respectively. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the vulnerability is remotely exploitable over the network without any authentication or user interaction, with low attack complexity. Successful exploitation can lead to complete compromise of confidentiality, integrity, and availability of the affected devices. Baicells products are typically used in wireless broadband infrastructure, including LTE and 5G small cell deployments, often in enterprise and service provider environments. The lack of available patches at the time of publication increases the urgency for mitigation. Although no known exploits are reported in the wild yet, the critical nature and ease of exploitation make this a high-risk vulnerability that could be leveraged by attackers to gain persistent control over network infrastructure components, potentially disrupting service and exfiltrating sensitive data.

Potential Impact

For European organizations, the impact of CVE-2025-55048 could be significant, especially for telecommunications providers, internet service providers, and enterprises relying on Baicells wireless infrastructure for connectivity. Exploitation could lead to unauthorized command execution on network devices, resulting in service outages, interception or manipulation of network traffic, and potential lateral movement within the network. This could disrupt critical communications, degrade service quality, and expose sensitive customer or operational data. Given the role of these devices in broadband access networks, attacks could affect both urban and rural connectivity, impacting business continuity and public safety communications. Additionally, compromised devices could be used as footholds for further attacks against European critical infrastructure or government networks, increasing national security risks. The absence of patches and the high severity score necessitate immediate attention to prevent exploitation and mitigate potential widespread impact across European telecom and enterprise sectors.

Mitigation Recommendations

1. Immediate Network Segmentation: Isolate affected Baicells devices from critical network segments and limit their exposure to untrusted networks to reduce attack surface. 2. Access Control: Implement strict firewall rules to restrict management interfaces and control plane access to trusted IP addresses only. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual command execution patterns or anomalous traffic from Baicells devices. 4. Vendor Coordination: Engage with Baicells support to obtain timelines for patches or firmware updates addressing CVE-2025-55048. 5. Temporary Workarounds: If available, disable vulnerable services or features that process external input leading to command injection. 6. Incident Response Preparedness: Prepare for rapid incident response including device isolation, forensic analysis, and recovery procedures in case of exploitation. 7. Firmware Integrity Verification: Regularly verify firmware integrity and consider deploying devices with signed firmware to prevent unauthorized modifications. 8. Network Device Hardening: Apply best practices such as disabling unused services, changing default credentials, and enforcing strong authentication where possible. These steps go beyond generic advice by focusing on immediate containment, proactive detection, and vendor engagement specific to Baicells infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:04:25.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c076b59256f7c60d152edf

Added to database: 9/9/2025, 6:49:25 PM

Last enriched: 9/17/2025, 12:58:22 AM

Last updated: 10/30/2025, 2:19:28 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats