Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65883: n/a

0
Unknown
VulnerabilityCVE-2025-65883cvecve-2025-65883
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.

AI-Powered Analysis

AILast updated: 12/04/2025, 19:41:13 UTC

Technical Analysis

CVE-2025-65883 is a critical security vulnerability affecting the Genexis Platinum P4410 router running firmware version P4410-V2–1.41. The root cause is improper session management: when an administrator logs out, the session token is not invalidated and remains active. This allows an attacker with access to the local network to reuse the stale session token to send specially crafted requests to the router’s diagnostic endpoint. Exploiting this flaw enables remote code execution (RCE) with root privileges, effectively giving the attacker full control over the device. The vulnerability does not require the attacker to authenticate or trick a user into interaction, but it does require local network access, which could be achieved via compromised internal hosts or malicious insiders. The diagnostic endpoint is likely intended for maintenance or troubleshooting, but its exposure combined with session token reuse creates a critical attack vector. No CVSS score has been assigned yet, and no patches or mitigations have been officially released. While no active exploitation has been reported, the potential impact is severe given the root-level access and the critical role routers play in network security and connectivity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure security. Successful exploitation could lead to full compromise of the affected routers, enabling attackers to intercept, modify, or redirect network traffic, deploy malware, or establish persistent footholds within corporate networks. This could result in data breaches, disruption of business operations, and loss of confidentiality and integrity of communications. Organizations relying on Genexis Platinum P4410 routers in their local networks, especially in sectors like telecommunications, critical infrastructure, and enterprises with sensitive data, face elevated risks. The local network access requirement limits remote exploitation but does not eliminate risk, as internal threats or lateral movement from compromised devices could enable attacks. The absence of patches increases exposure time, and the root-level access amplifies the potential damage.

Mitigation Recommendations

Until an official firmware update is released, European organizations should implement several specific mitigations: 1) Restrict physical and network access to the local network segments where Genexis Platinum P4410 routers are deployed, using VLANs and network segmentation to isolate these devices from general user access. 2) Enforce strict access control policies and monitor for unauthorized devices or users on the local network. 3) Disable or restrict access to the router’s diagnostic endpoint if possible, or apply firewall rules to limit access to trusted management hosts only. 4) Regularly audit router session management and logs to detect reuse of stale session tokens or suspicious activity. 5) Educate network administrators about the vulnerability and encourage immediate logout and session termination practices. 6) Prepare for rapid deployment of firmware updates once available by maintaining an inventory of affected devices. 7) Consider deploying network intrusion detection systems (NIDS) to identify anomalous traffic patterns indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931e372e9ea8245266ca5b7

Added to database: 12/4/2025, 7:39:30 PM

Last enriched: 12/4/2025, 7:41:13 PM

Last updated: 12/5/2025, 2:30:23 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats