CVE-2025-65883: n/a
A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.
AI Analysis
Technical Summary
CVE-2025-65883 is a vulnerability identified in the Genexis Platinum P4410 router running firmware version P4410-V2–1.41. The root cause is improper session management, specifically the failure to invalidate administrator session tokens upon logout. When an administrator logs out, the session token remains valid, allowing an attacker on the local network to reuse this stale token. By sending specially crafted requests to the router’s diagnostic endpoint, the attacker can execute arbitrary commands with root privileges, effectively achieving remote code execution (RCE). This vulnerability is classified under CWE-613 (Insufficient Session Expiration). The CVSS v3.1 base score is 8.4, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently reported, the vulnerability’s nature allows an attacker with local network access to fully compromise the device. The affected firmware version is specifically P4410-V2–1.41, with no patches currently listed, emphasizing the need for vendor action. The diagnostic endpoint is a critical attack surface, and the failure to invalidate sessions post-logout is a serious security oversight. This vulnerability could be leveraged to pivot into internal networks, intercept or manipulate traffic, or disrupt network services.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for those using Genexis Platinum P4410 routers in their infrastructure. Successful exploitation grants attackers root-level control over the router, enabling them to intercept, modify, or redirect network traffic, deploy further malware, or disrupt network availability. This could lead to data breaches, loss of service, or compromise of connected systems. Critical sectors such as telecommunications, government, finance, and energy that rely on secure and stable network infrastructure are particularly vulnerable. The local network attack vector means that attackers must have access to the internal network, which could be achieved via compromised devices, insider threats, or physical access. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if personal data is compromised. The lack of a patch increases the urgency for interim mitigations. The vulnerability also raises concerns for managed service providers and ISPs deploying these routers in customer premises equipment (CPE), potentially affecting a broad user base across Europe.
Mitigation Recommendations
Immediate mitigation should focus on restricting local network access to the Genexis Platinum P4410 routers. Network segmentation should be enforced to isolate management interfaces from general user networks. Strong access controls and monitoring for unusual activity on the diagnostic endpoint are critical. Administrators should avoid using the vulnerable firmware version and seek updates or patches from Genexis as a priority. If patches are unavailable, consider replacing affected devices or disabling the diagnostic endpoint if possible. Implement network-level protections such as firewall rules to limit access to router management interfaces. Regularly audit session management behavior and monitor for reuse of stale tokens. Employ intrusion detection systems to detect anomalous command execution attempts. Educate staff about the risks of local network threats and enforce strict physical security controls to prevent unauthorized local access. Finally, maintain updated inventories of affected devices to prioritize remediation efforts.
Affected Countries
Netherlands, Germany, Belgium, France, United Kingdom
CVE-2025-65883: n/a
Description
A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.
AI-Powered Analysis
Technical Analysis
CVE-2025-65883 is a vulnerability identified in the Genexis Platinum P4410 router running firmware version P4410-V2–1.41. The root cause is improper session management, specifically the failure to invalidate administrator session tokens upon logout. When an administrator logs out, the session token remains valid, allowing an attacker on the local network to reuse this stale token. By sending specially crafted requests to the router’s diagnostic endpoint, the attacker can execute arbitrary commands with root privileges, effectively achieving remote code execution (RCE). This vulnerability is classified under CWE-613 (Insufficient Session Expiration). The CVSS v3.1 base score is 8.4, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently reported, the vulnerability’s nature allows an attacker with local network access to fully compromise the device. The affected firmware version is specifically P4410-V2–1.41, with no patches currently listed, emphasizing the need for vendor action. The diagnostic endpoint is a critical attack surface, and the failure to invalidate sessions post-logout is a serious security oversight. This vulnerability could be leveraged to pivot into internal networks, intercept or manipulate traffic, or disrupt network services.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for those using Genexis Platinum P4410 routers in their infrastructure. Successful exploitation grants attackers root-level control over the router, enabling them to intercept, modify, or redirect network traffic, deploy further malware, or disrupt network availability. This could lead to data breaches, loss of service, or compromise of connected systems. Critical sectors such as telecommunications, government, finance, and energy that rely on secure and stable network infrastructure are particularly vulnerable. The local network attack vector means that attackers must have access to the internal network, which could be achieved via compromised devices, insider threats, or physical access. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if personal data is compromised. The lack of a patch increases the urgency for interim mitigations. The vulnerability also raises concerns for managed service providers and ISPs deploying these routers in customer premises equipment (CPE), potentially affecting a broad user base across Europe.
Mitigation Recommendations
Immediate mitigation should focus on restricting local network access to the Genexis Platinum P4410 routers. Network segmentation should be enforced to isolate management interfaces from general user networks. Strong access controls and monitoring for unusual activity on the diagnostic endpoint are critical. Administrators should avoid using the vulnerable firmware version and seek updates or patches from Genexis as a priority. If patches are unavailable, consider replacing affected devices or disabling the diagnostic endpoint if possible. Implement network-level protections such as firewall rules to limit access to router management interfaces. Regularly audit session management behavior and monitor for reuse of stale tokens. Employ intrusion detection systems to detect anomalous command execution attempts. Educate staff about the risks of local network threats and enforce strict physical security controls to prevent unauthorized local access. Finally, maintain updated inventories of affected devices to prioritize remediation efforts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6931e372e9ea8245266ca5b7
Added to database: 12/4/2025, 7:39:30 PM
Last enriched: 12/11/2025, 9:57:58 PM
Last updated: 1/18/2026, 2:21:19 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1107: Unrestricted Upload in EyouCMS
MediumCVE-2026-1106: Improper Authorization in Chamilo LMS
MediumCVE-2026-1105: SQL Injection in EasyCMS
MediumCVE-2026-1066: Command Injection in kalcaddle kodbox
MediumCVE-2026-1064: Command Injection in bastillion-io Bastillion
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.