CVE-2025-63258: n/a
A remote command execution (RCE) vulnerability was discovered in all H3C ERG3/ERG5 series routers and XiaoBei series routers, cloud gateways, and wireless access points (versions R0162P07, UAP700-WPT330-E2265, UAP672-WPT330-R2262, UAP662E-WPT330-R2262P03, WAP611-WPT330-R1348-OASIS, WAP662-WPT330-R2262, WAP662H-WPT330-R2262, USG300V2-WPT330-R2129, MSG300-WPT330-R1350, and MSG326-WPT330-R2129). Attackers are able to exploit this vulnerability via injecting crafted commands into the sessionid parameter.
AI Analysis
Technical Summary
CVE-2025-63258 is a remote command execution (RCE) vulnerability identified in a range of H3C network devices, including ERG3/ERG5 series routers and XiaoBei series routers, cloud gateways, and wireless access points. The affected device firmware versions include R0162P07, UAP700-WPT330-E2265, UAP672-WPT330-R2262, UAP662E-WPT330-R2262P03, WAP611-WPT330-R1348-OASIS, WAP662-WPT330-R2262, WAP662H-WPT330-R2262, USG300V2-WPT330-R2129, MSG300-WPT330-R1350, and MSG326-WPT330-R2129. The vulnerability arises from improper sanitization of the sessionid parameter, which allows attackers to inject crafted commands that the device executes. This is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating a command injection flaw. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The CVSS v3.1 base score is 6.5, reflecting medium severity with limited confidentiality and integrity impacts but no direct availability impact. No patches or official fixes have been published yet, and there are no known exploits in the wild. The vulnerability could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, configuration changes, or data leakage within affected devices.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure security. Exploitation could allow attackers to execute arbitrary commands on critical network devices, potentially leading to unauthorized configuration changes, interception or manipulation of network traffic, and partial compromise of network confidentiality and integrity. While availability impact is not indicated, the ability to alter device behavior could indirectly disrupt network operations. Organizations relying on H3C ERG3/ERG5 and XiaoBei series devices in their enterprise or service provider networks may face increased risk of targeted attacks, especially if these devices are exposed to untrusted networks or lack proper segmentation. The absence of authentication requirements and user interaction lowers the barrier for exploitation, increasing the threat surface. This could be leveraged in espionage, data exfiltration, or lateral movement within corporate networks. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement compensating controls to mitigate risk. First, restrict network access to affected devices by implementing strict firewall rules and network segmentation, ensuring that management interfaces are not exposed to untrusted networks. Second, deploy intrusion detection and prevention systems (IDS/IPS) with custom signatures to monitor and block suspicious payloads targeting the sessionid parameter, focusing on command injection patterns. Third, conduct regular audits of device configurations and logs to detect anomalous command executions or unauthorized changes. Fourth, enforce strong access controls and multi-factor authentication on network management interfaces to reduce the risk of lateral exploitation. Fifth, engage with H3C support channels to obtain timely updates or workarounds as they become available. Finally, consider temporary replacement or isolation of vulnerable devices in critical environments until patches are released. Network administrators should also educate staff on this vulnerability to enhance detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-63258: n/a
Description
A remote command execution (RCE) vulnerability was discovered in all H3C ERG3/ERG5 series routers and XiaoBei series routers, cloud gateways, and wireless access points (versions R0162P07, UAP700-WPT330-E2265, UAP672-WPT330-R2262, UAP662E-WPT330-R2262P03, WAP611-WPT330-R1348-OASIS, WAP662-WPT330-R2262, WAP662H-WPT330-R2262, USG300V2-WPT330-R2129, MSG300-WPT330-R1350, and MSG326-WPT330-R2129). Attackers are able to exploit this vulnerability via injecting crafted commands into the sessionid parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-63258 is a remote command execution (RCE) vulnerability identified in a range of H3C network devices, including ERG3/ERG5 series routers and XiaoBei series routers, cloud gateways, and wireless access points. The affected device firmware versions include R0162P07, UAP700-WPT330-E2265, UAP672-WPT330-R2262, UAP662E-WPT330-R2262P03, WAP611-WPT330-R1348-OASIS, WAP662-WPT330-R2262, WAP662H-WPT330-R2262, USG300V2-WPT330-R2129, MSG300-WPT330-R1350, and MSG326-WPT330-R2129. The vulnerability arises from improper sanitization of the sessionid parameter, which allows attackers to inject crafted commands that the device executes. This is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating a command injection flaw. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The CVSS v3.1 base score is 6.5, reflecting medium severity with limited confidentiality and integrity impacts but no direct availability impact. No patches or official fixes have been published yet, and there are no known exploits in the wild. The vulnerability could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, configuration changes, or data leakage within affected devices.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure security. Exploitation could allow attackers to execute arbitrary commands on critical network devices, potentially leading to unauthorized configuration changes, interception or manipulation of network traffic, and partial compromise of network confidentiality and integrity. While availability impact is not indicated, the ability to alter device behavior could indirectly disrupt network operations. Organizations relying on H3C ERG3/ERG5 and XiaoBei series devices in their enterprise or service provider networks may face increased risk of targeted attacks, especially if these devices are exposed to untrusted networks or lack proper segmentation. The absence of authentication requirements and user interaction lowers the barrier for exploitation, increasing the threat surface. This could be leveraged in espionage, data exfiltration, or lateral movement within corporate networks. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement compensating controls to mitigate risk. First, restrict network access to affected devices by implementing strict firewall rules and network segmentation, ensuring that management interfaces are not exposed to untrusted networks. Second, deploy intrusion detection and prevention systems (IDS/IPS) with custom signatures to monitor and block suspicious payloads targeting the sessionid parameter, focusing on command injection patterns. Third, conduct regular audits of device configurations and logs to detect anomalous command executions or unauthorized changes. Fourth, enforce strong access controls and multi-factor authentication on network management interfaces to reduce the risk of lateral exploitation. Fifth, engage with H3C support channels to obtain timely updates or workarounds as they become available. Finally, consider temporary replacement or isolation of vulnerable devices in critical environments until patches are released. Network administrators should also educate staff on this vulnerability to enhance detection and response capabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691ca514209f2030fafbb904
Added to database: 11/18/2025, 4:55:48 PM
Last enriched: 11/25/2025, 5:12:03 PM
Last updated: 1/7/2026, 4:17:44 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.