Skip to main content

CVE-2025-6559: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sapido BR071n

Critical
VulnerabilityCVE-2025-6559cvecve-2025-6559cwe-78
Published: Tue Jun 24 2025 (06/24/2025, 01:47:25 UTC)
Source: CVE Database V5
Vendor/Project: Sapido
Product: BR071n

Description

Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. The affected models are out of support; replacing the device is recommended.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:54:59 UTC

Technical Analysis

CVE-2025-6559 is a critical OS Command Injection vulnerability (CWE-78) affecting multiple wireless router models from Sapido, specifically the BR071n model. This vulnerability allows unauthenticated remote attackers to inject arbitrary operating system commands and execute them on the affected device. The root cause is improper neutralization of special elements used in OS commands, enabling attackers to manipulate command inputs and execute malicious code at the OS level. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. The affected devices are out of support, and no patches or firmware updates are available from the vendor. The CVSS 4.0 base score is 9.3 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation and the unauthenticated remote attack vector. Although no known exploits have been reported in the wild yet, the vulnerability presents a significant risk due to the nature of the device (wireless routers) which are often deployed at network perimeters and can serve as entry points for attackers to pivot into internal networks. The lack of vendor support and absence of patches further exacerbate the risk, leaving affected devices vulnerable indefinitely unless replaced or mitigated through network controls.

Potential Impact

For European organizations, the impact of this vulnerability could be severe. Wireless routers like the Sapido BR071n are commonly used in small to medium enterprises and residential environments, often serving as the first line of defense for network traffic. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, launch further attacks on internal systems, or establish persistent footholds within corporate or home networks. This could result in data breaches, disruption of business operations, and loss of sensitive information. Given the criticality and unauthenticated nature of the vulnerability, attackers could easily exploit exposed devices remotely, increasing the attack surface. Additionally, compromised routers could be leveraged as part of botnets for distributed denial-of-service (DDoS) attacks, impacting availability of services. The fact that affected devices are out of support means organizations cannot rely on vendor patches, increasing the operational risk and complicating incident response and remediation efforts.

Mitigation Recommendations

1. Immediate replacement of all Sapido BR071n routers with supported, secure models is the most effective mitigation, as no patches are available. 2. If replacement is not immediately feasible, isolate affected devices on segmented network zones with strict access controls to limit exposure. 3. Implement network-level firewall rules to restrict inbound traffic to router management interfaces, ideally blocking all remote management access from untrusted networks. 4. Employ network monitoring and intrusion detection systems to detect anomalous command injection attempts or unusual router behavior. 5. Disable any unnecessary services or remote management features on the affected routers to reduce attack vectors. 6. Conduct regular network audits to inventory and identify any remaining vulnerable Sapido BR071n devices. 7. Educate users and administrators about the risks of using unsupported hardware and the importance of timely device replacement. 8. Consider deploying network access control (NAC) solutions to prevent vulnerable devices from connecting to critical network segments. These steps go beyond generic advice by focusing on network segmentation, access control, and device lifecycle management specific to this vulnerability and device type.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-06-24T01:24:44.230Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0febdec26fc862d8d928

Added to database: 6/24/2025, 2:39:39 AM

Last enriched: 6/24/2025, 2:54:59 AM

Last updated: 8/9/2025, 11:24:10 AM

Views: 45

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats