Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66953: n/a

0
High
VulnerabilityCVE-2025-66953cvecve-2025-66953
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CSRF vulnerability in narda miteq Uplink Power Contril Unit UPC2 v.1.17 allows a remote attacker to execute arbitrary code via the Web-based management interface and specifically the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints

AI-Powered Analysis

AILast updated: 12/24/2025, 19:15:12 UTC

Technical Analysis

CVE-2025-66953 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the narda miteq Uplink Power Control Unit (UPC2) version 1.17. The vulnerability resides in the device's web-based management interface, specifically within endpoints like /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm, and /channel_setup.htm. An attacker can exploit this flaw remotely by tricking an authenticated user into submitting crafted requests, which the device processes without proper CSRF token validation. This leads to arbitrary code execution on the device, compromising its confidentiality, integrity, and availability. The CVSS 3.1 base score of 8.8 reflects the high impact and ease of exploitation, as no privileges are required and only user interaction is necessary. Although no public exploits have been reported yet, the vulnerability poses a significant threat to telecommunications infrastructure relying on this hardware. The lack of available patches increases the urgency for organizations to implement compensating controls. The CWE-352 classification confirms the root cause as insufficient CSRF protections in the web interface. This vulnerability could allow attackers to manipulate device configurations, disrupt uplink power control, and potentially cause widespread service outages or data leakage.

Potential Impact

For European organizations, particularly those in telecommunications and critical infrastructure sectors, this vulnerability could lead to severe operational disruptions. Exploitation may allow attackers to alter uplink power settings, degrade network performance, or cause outages affecting large user bases. Confidential information managed by the device could be exposed or manipulated, undermining trust and regulatory compliance, especially under GDPR mandates. The integrity of network configurations could be compromised, enabling persistent unauthorized access or facilitating further attacks within the network. The availability of critical communication services could be impacted, affecting emergency services and business continuity. Given the device's role in uplink power control, the threat extends to any dependent systems and services, amplifying the potential damage. The absence of patches and the device's deployment in European telecom networks elevate the risk profile for affected organizations.

Mitigation Recommendations

Organizations should immediately implement strict CSRF protections on the web management interface, including the use of anti-CSRF tokens and validating the origin of requests. Network segmentation should isolate the management interface from general user networks to reduce exposure. Access to the device's web interface must be restricted using strong authentication mechanisms and IP whitelisting where possible. Monitoring and logging of management interface access should be enhanced to detect suspicious activities promptly. If feasible, disable the web interface or restrict it to maintenance windows until a vendor patch is available. Employ web application firewalls (WAFs) to filter malicious requests targeting the vulnerable endpoints. Regularly review and update device firmware and configurations, and engage with the vendor for timely patch releases. Conduct user awareness training to prevent social engineering attacks that could trigger CSRF exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942fb890b6f32e62be62d51

Added to database: 12/17/2025, 6:50:49 PM

Last enriched: 12/24/2025, 7:15:12 PM

Last updated: 2/7/2026, 7:39:14 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats