CVE-2025-55048: Multiple CWE-78 in Baicells NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, NOVA227
Multiple CWE-78
AI Analysis
Technical Summary
CVE-2025-55048 is a critical security vulnerability affecting multiple Baicells products, including NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, and NOVA227. The vulnerability is classified under CWE-78, which corresponds to OS Command Injection. This type of vulnerability allows an attacker to execute arbitrary operating system commands on the affected device. The affected versions include several releases of Baicells' BaiBS_RTS and BaiBS_RTD firmware, specifically versions 3.6.6 through 3.7.11.16 and 3.7.11.6 respectively. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the vulnerability is remotely exploitable over the network without any authentication or user interaction, with low attack complexity. Successful exploitation can lead to complete compromise of confidentiality, integrity, and availability of the affected devices. Baicells products are typically used in wireless broadband infrastructure, including LTE and 5G small cell deployments, often in enterprise and service provider environments. The lack of available patches at the time of publication increases the urgency for mitigation. Although no known exploits are reported in the wild yet, the critical nature and ease of exploitation make this a high-risk vulnerability that could be leveraged by attackers to gain persistent control over network infrastructure components, potentially disrupting service and exfiltrating sensitive data.
Potential Impact
For European organizations, the impact of CVE-2025-55048 could be significant, especially for telecommunications providers, internet service providers, and enterprises relying on Baicells wireless infrastructure for connectivity. Exploitation could lead to unauthorized command execution on network devices, resulting in service outages, interception or manipulation of network traffic, and potential lateral movement within the network. This could disrupt critical communications, degrade service quality, and expose sensitive customer or operational data. Given the role of these devices in broadband access networks, attacks could affect both urban and rural connectivity, impacting business continuity and public safety communications. Additionally, compromised devices could be used as footholds for further attacks against European critical infrastructure or government networks, increasing national security risks. The absence of patches and the high severity score necessitate immediate attention to prevent exploitation and mitigate potential widespread impact across European telecom and enterprise sectors.
Mitigation Recommendations
1. Immediate Network Segmentation: Isolate affected Baicells devices from critical network segments and limit their exposure to untrusted networks to reduce attack surface. 2. Access Control: Implement strict firewall rules to restrict management interfaces and control plane access to trusted IP addresses only. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual command execution patterns or anomalous traffic from Baicells devices. 4. Vendor Coordination: Engage with Baicells support to obtain timelines for patches or firmware updates addressing CVE-2025-55048. 5. Temporary Workarounds: If available, disable vulnerable services or features that process external input leading to command injection. 6. Incident Response Preparedness: Prepare for rapid incident response including device isolation, forensic analysis, and recovery procedures in case of exploitation. 7. Firmware Integrity Verification: Regularly verify firmware integrity and consider deploying devices with signed firmware to prevent unauthorized modifications. 8. Network Device Hardening: Apply best practices such as disabling unused services, changing default credentials, and enforcing strong authentication where possible. These steps go beyond generic advice by focusing on immediate containment, proactive detection, and vendor engagement specific to Baicells infrastructure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-55048: Multiple CWE-78 in Baicells NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, NOVA227
Description
Multiple CWE-78
AI-Powered Analysis
Technical Analysis
CVE-2025-55048 is a critical security vulnerability affecting multiple Baicells products, including NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, and NOVA227. The vulnerability is classified under CWE-78, which corresponds to OS Command Injection. This type of vulnerability allows an attacker to execute arbitrary operating system commands on the affected device. The affected versions include several releases of Baicells' BaiBS_RTS and BaiBS_RTD firmware, specifically versions 3.6.6 through 3.7.11.16 and 3.7.11.6 respectively. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the vulnerability is remotely exploitable over the network without any authentication or user interaction, with low attack complexity. Successful exploitation can lead to complete compromise of confidentiality, integrity, and availability of the affected devices. Baicells products are typically used in wireless broadband infrastructure, including LTE and 5G small cell deployments, often in enterprise and service provider environments. The lack of available patches at the time of publication increases the urgency for mitigation. Although no known exploits are reported in the wild yet, the critical nature and ease of exploitation make this a high-risk vulnerability that could be leveraged by attackers to gain persistent control over network infrastructure components, potentially disrupting service and exfiltrating sensitive data.
Potential Impact
For European organizations, the impact of CVE-2025-55048 could be significant, especially for telecommunications providers, internet service providers, and enterprises relying on Baicells wireless infrastructure for connectivity. Exploitation could lead to unauthorized command execution on network devices, resulting in service outages, interception or manipulation of network traffic, and potential lateral movement within the network. This could disrupt critical communications, degrade service quality, and expose sensitive customer or operational data. Given the role of these devices in broadband access networks, attacks could affect both urban and rural connectivity, impacting business continuity and public safety communications. Additionally, compromised devices could be used as footholds for further attacks against European critical infrastructure or government networks, increasing national security risks. The absence of patches and the high severity score necessitate immediate attention to prevent exploitation and mitigate potential widespread impact across European telecom and enterprise sectors.
Mitigation Recommendations
1. Immediate Network Segmentation: Isolate affected Baicells devices from critical network segments and limit their exposure to untrusted networks to reduce attack surface. 2. Access Control: Implement strict firewall rules to restrict management interfaces and control plane access to trusted IP addresses only. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual command execution patterns or anomalous traffic from Baicells devices. 4. Vendor Coordination: Engage with Baicells support to obtain timelines for patches or firmware updates addressing CVE-2025-55048. 5. Temporary Workarounds: If available, disable vulnerable services or features that process external input leading to command injection. 6. Incident Response Preparedness: Prepare for rapid incident response including device isolation, forensic analysis, and recovery procedures in case of exploitation. 7. Firmware Integrity Verification: Regularly verify firmware integrity and consider deploying devices with signed firmware to prevent unauthorized modifications. 8. Network Device Hardening: Apply best practices such as disabling unused services, changing default credentials, and enforcing strong authentication where possible. These steps go beyond generic advice by focusing on immediate containment, proactive detection, and vendor engagement specific to Baicells infrastructure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCD
- Date Reserved
- 2025-08-06T11:04:25.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c076b59256f7c60d152edf
Added to database: 9/9/2025, 6:49:25 PM
Last enriched: 9/17/2025, 12:58:22 AM
Last updated: 10/29/2025, 12:19:20 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
MediumCVE-2024-52316: CWE-391 Unchecked Error Condition in Apache Software Foundation Apache Tomcat
CriticalCVE-2024-50379: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Apache Software Foundation Apache Tomcat
CriticalCVE-2023-39178
UnknownCVE-2024-56337: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Apache Software Foundation Apache Tomcat
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.