Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67113: n/a

0
Unknown
VulnerabilityCVE-2025-67113cvecve-2025-67113
Published: Thu Mar 19 2026 (03/19/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

OS command injection in the CWMP client (/ftl/bin/cwmp) of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote attackers controlling the ACS endpoint to execute arbitrary commands as root via a crafted TR-069 Download URL that is passed unescaped into the firmware upgrade pipeline.

AI-Powered Analysis

AILast updated: 03/19/2026, 17:55:02 UTC

Technical Analysis

CVE-2025-67113 identifies a critical OS command injection vulnerability in the CWMP client (/ftl/bin/cwmp) of the Small Cell Sercomm SCE4255W device, specifically in firmware versions prior to DG3934v3@2308041842. The vulnerability arises from improper sanitization of the TR-069 Download URL parameter, which is passed unescaped into the firmware upgrade pipeline. The CWMP client is responsible for managing device configuration and firmware upgrades via the TR-069 protocol, which communicates with an Auto Configuration Server (ACS). An attacker who controls or compromises the ACS endpoint can craft a malicious Download URL that injects arbitrary OS commands executed with root privileges on the device. This leads to full system compromise, enabling attackers to execute any commands, potentially install persistent malware, disrupt device operation, or use the device as a pivot point into internal networks. The vulnerability does not require user interaction but does require control over the ACS server, which is typically restricted but can be targeted via supply chain attacks or insider threats. No public exploits or patches are currently available, and no CVSS score has been assigned. The vulnerability was reserved in December 2025 and published in March 2026. The affected product is used in small cell infrastructure, notably FreedomFi Englewood deployments, which are part of private and public 5G networks. The lack of input validation in the firmware upgrade process represents a critical security flaw that must be addressed promptly.

Potential Impact

The impact of CVE-2025-67113 is severe for organizations deploying the affected Small Cell Sercomm SCE4255W devices. Successful exploitation grants attackers root-level control over the device, enabling them to execute arbitrary commands, modify firmware, disrupt network services, or establish persistent backdoors. This can lead to complete device compromise, loss of confidentiality, integrity, and availability of the small cell infrastructure. Since these devices are often part of 5G private or public network deployments, attackers could leverage compromised devices to intercept or manipulate network traffic, degrade service quality, or launch further attacks against connected enterprise or carrier networks. The requirement for ACS endpoint control limits the attack surface but does not eliminate risk, especially if ACS servers are misconfigured, exposed, or compromised. The vulnerability could also facilitate supply chain attacks or insider threats targeting telecommunications infrastructure. Overall, the threat poses a significant risk to network reliability, data privacy, and operational continuity for organizations relying on these small cells.

Mitigation Recommendations

To mitigate CVE-2025-67113, organizations should: 1) Immediately restrict access to the ACS server to trusted administrators and networks, employing strong authentication and network segmentation to prevent unauthorized control. 2) Monitor ACS server logs and network traffic for suspicious Download URL requests or anomalous firmware upgrade activities. 3) Apply firmware updates from Sercomm as soon as they become available that address this vulnerability. 4) If updates are not yet available, consider disabling remote firmware upgrades or implementing strict validation and filtering of TR-069 parameters at the ACS level. 5) Conduct regular security audits of ACS server configurations and access controls to minimize risk of compromise. 6) Employ network-level protections such as firewalls and intrusion detection systems to detect and block exploitation attempts. 7) Educate operational teams on the risks of ACS endpoint compromise and enforce strict operational security practices. 8) Consider deploying endpoint detection and response (EDR) solutions on network infrastructure to detect unusual command execution patterns indicative of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bc34d3e32a4fbe5fe2fca7

Added to database: 3/19/2026, 5:39:31 PM

Last enriched: 3/19/2026, 5:55:02 PM

Last updated: 3/20/2026, 5:17:03 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses