Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66953: n/a

0
Unknown
VulnerabilityCVE-2025-66953cvecve-2025-66953
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CSRF vulnerability in narda miteq Uplink Power Contril Unit UPC2 v.1.17 allows a remote attacker to execute arbitrary code via the Web-based management interface and specifically the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints

AI-Powered Analysis

AILast updated: 12/17/2025, 18:51:39 UTC

Technical Analysis

CVE-2025-66953 is a CSRF vulnerability identified in the narda miteq Uplink Power Control Unit (UPC2) version 1.17, a device used in managing uplink power in telecommunications or broadcasting systems. The vulnerability resides in the web-based management interface, specifically in endpoints like /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm, and /channel_setup.htm. Through CSRF, an attacker can trick an authenticated user into submitting unauthorized requests, leading to arbitrary code execution on the device. This means an attacker can remotely execute commands or alter device configurations without direct authentication, provided the victim accesses a malicious webpage or link. The lack of authentication requirement and the ability to execute arbitrary code make this vulnerability particularly dangerous. Although no patches or known exploits are currently available, the vulnerability's presence in critical infrastructure devices poses a significant risk. The device's role in controlling uplink power means exploitation could disrupt telecommunications services or be leveraged for further network intrusion. The vulnerability was published on December 17, 2025, with no CVSS score assigned yet, indicating it is a recent discovery. The absence of patches necessitates immediate mitigation through network controls and monitoring.

Potential Impact

For European organizations, especially those in telecommunications, broadcasting, or critical infrastructure sectors, this vulnerability could lead to severe operational disruptions. Exploitation could allow attackers to alter uplink power settings, potentially causing service outages or degraded network performance. Unauthorized code execution could also enable attackers to implant persistent malware, intercept or manipulate data, or use the compromised device as a pivot point for lateral movement within networks. The confidentiality, integrity, and availability of critical communication services could be compromised, affecting both private and public sector entities. Given the strategic importance of telecommunications infrastructure in Europe, successful exploitation could have cascading effects on emergency services, financial systems, and governmental communications. The lack of authentication and the web-based attack vector increase the attack surface, making remote exploitation feasible if the management interface is exposed or accessible internally.

Mitigation Recommendations

1. Immediately restrict access to the narda miteq UPC2 web management interface to trusted networks only, using network segmentation and firewall rules. 2. Implement strict access controls and VPN requirements for remote management to prevent unauthorized access. 3. Employ web application firewalls (WAFs) to detect and block CSRF attack patterns targeting the specified endpoints. 4. Monitor network traffic and device logs for unusual requests or configuration changes indicative of exploitation attempts. 5. Educate users with access to the device about the risks of CSRF and advise against clicking on suspicious links or visiting untrusted websites while connected to the management network. 6. Coordinate with narda miteq for timely patch releases and apply updates as soon as they become available. 7. Consider deploying intrusion detection systems (IDS) with signatures tailored to detect exploitation attempts against this vulnerability. 8. If possible, disable the web management interface temporarily or switch to alternative management methods until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942fb890b6f32e62be62d51

Added to database: 12/17/2025, 6:50:49 PM

Last enriched: 12/17/2025, 6:51:39 PM

Last updated: 12/18/2025, 6:44:49 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats