Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63258: n/a

0
Medium
VulnerabilityCVE-2025-63258cvecve-2025-63258
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A remote command execution (RCE) vulnerability was discovered in all H3C ERG3/ERG5 series routers and XiaoBei series routers, cloud gateways, and wireless access points (versions R0162P07, UAP700-WPT330-E2265, UAP672-WPT330-R2262, UAP662E-WPT330-R2262P03, WAP611-WPT330-R1348-OASIS, WAP662-WPT330-R2262, WAP662H-WPT330-R2262, USG300V2-WPT330-R2129, MSG300-WPT330-R1350, and MSG326-WPT330-R2129). Attackers are able to exploit this vulnerability via injecting crafted commands into the sessionid parameter.

AI-Powered Analysis

AILast updated: 11/25/2025, 17:12:03 UTC

Technical Analysis

CVE-2025-63258 is a remote command execution (RCE) vulnerability identified in a range of H3C network devices, including ERG3/ERG5 series routers and XiaoBei series routers, cloud gateways, and wireless access points. The affected device firmware versions include R0162P07, UAP700-WPT330-E2265, UAP672-WPT330-R2262, UAP662E-WPT330-R2262P03, WAP611-WPT330-R1348-OASIS, WAP662-WPT330-R2262, WAP662H-WPT330-R2262, USG300V2-WPT330-R2129, MSG300-WPT330-R1350, and MSG326-WPT330-R2129. The vulnerability arises from improper sanitization of the sessionid parameter, which allows attackers to inject crafted commands that the device executes. This is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating a command injection flaw. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The CVSS v3.1 base score is 6.5, reflecting medium severity with limited confidentiality and integrity impacts but no direct availability impact. No patches or official fixes have been published yet, and there are no known exploits in the wild. The vulnerability could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, configuration changes, or data leakage within affected devices.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure security. Exploitation could allow attackers to execute arbitrary commands on critical network devices, potentially leading to unauthorized configuration changes, interception or manipulation of network traffic, and partial compromise of network confidentiality and integrity. While availability impact is not indicated, the ability to alter device behavior could indirectly disrupt network operations. Organizations relying on H3C ERG3/ERG5 and XiaoBei series devices in their enterprise or service provider networks may face increased risk of targeted attacks, especially if these devices are exposed to untrusted networks or lack proper segmentation. The absence of authentication requirements and user interaction lowers the barrier for exploitation, increasing the threat surface. This could be leveraged in espionage, data exfiltration, or lateral movement within corporate networks. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement compensating controls to mitigate risk. First, restrict network access to affected devices by implementing strict firewall rules and network segmentation, ensuring that management interfaces are not exposed to untrusted networks. Second, deploy intrusion detection and prevention systems (IDS/IPS) with custom signatures to monitor and block suspicious payloads targeting the sessionid parameter, focusing on command injection patterns. Third, conduct regular audits of device configurations and logs to detect anomalous command executions or unauthorized changes. Fourth, enforce strong access controls and multi-factor authentication on network management interfaces to reduce the risk of lateral exploitation. Fifth, engage with H3C support channels to obtain timely updates or workarounds as they become available. Finally, consider temporary replacement or isolation of vulnerable devices in critical environments until patches are released. Network administrators should also educate staff on this vulnerability to enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ca514209f2030fafbb904

Added to database: 11/18/2025, 4:55:48 PM

Last enriched: 11/25/2025, 5:12:03 PM

Last updated: 1/7/2026, 4:17:44 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats