Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31847: CWE-912 Hidden Functionality in Nexxt Solutions Nebula 300+

0
High
VulnerabilityCVE-2026-31847cvecve-2026-31847cwe-912
Published: Mon Mar 23 2026 (03/23/2026, 12:07:05 UTC)
Source: CVE Database V5
Vendor/Project: Nexxt Solutions
Product: Nebula 300+

Description

CVE-2026-31847 is a high-severity vulnerability in Nexxt Solutions Nebula 300+ firmware (versions up to 12. 01. 01. 37) involving hidden functionality that allows remote activation of a Telnet service via the /goform/setSysTools endpoint. This Telnet service exposes a privileged diagnostic management interface without user interaction or authentication, significantly increasing the attack surface. Exploiting this vulnerability can lead to unauthorized access and full compromise of the device. The vulnerability does not require user interaction but does require network access with high privileges. No known exploits are currently in the wild. Organizations using affected devices should prioritize firmware updates once available and restrict network access to management interfaces. Countries with significant deployment of Nexxt Solutions networking equipment, especially in enterprise and ISP environments, are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:12:44 UTC

Technical Analysis

CVE-2026-31847 is a vulnerability classified under CWE-912 (Hidden Functionality) found in the Nexxt Solutions Nebula 300+ router firmware versions up to 12.01.01.37. The flaw resides in a hidden endpoint, /goform/setSysTools, which allows an attacker with network access to remotely enable a Telnet service that is not normally exposed. Once enabled, this Telnet service provides access to a privileged diagnostic management interface, which is intended for internal use and not meant to be accessible remotely. This interface grants elevated privileges, potentially allowing attackers to execute arbitrary commands, alter device configurations, or pivot within the network. The vulnerability is exploitable without user interaction and does not require authentication, but the attacker must have network-level access to the device. The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality, integrity, and availability, as well as the relatively low attack complexity. No patches or exploits are currently documented, but the presence of such hidden functionality significantly increases the risk of compromise if discovered by malicious actors.

Potential Impact

The exploitation of this vulnerability can lead to full compromise of affected Nebula 300+ devices, enabling attackers to gain unauthorized administrative access. This can result in interception or manipulation of network traffic, disruption of network services, and use of the device as a foothold for lateral movement within an organization’s network. The exposure of a privileged diagnostic interface over Telnet, a protocol known for transmitting data in cleartext, further exacerbates the risk by enabling credential interception and session hijacking. Organizations relying on these devices for critical network infrastructure could face significant operational disruptions, data breaches, and potential regulatory compliance violations. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in environments where network segmentation or access controls are weak.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation to isolate Nebula 300+ devices from untrusted networks and restrict access to management interfaces to trusted administrators only. Disable Telnet services on these devices if possible, or block Telnet ports (typically TCP 23) at network firewalls. Monitor network traffic for unusual Telnet activity or attempts to access the /goform/setSysTools endpoint. Employ network intrusion detection systems (NIDS) with signatures targeting this vulnerability’s indicators. Regularly audit device firmware versions and plan for prompt updates once Nexxt Solutions releases a patch. Additionally, consider replacing affected devices with models that have a stronger security posture if immediate patching is not feasible. Implement multi-factor authentication and strong access controls on all management interfaces to reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TuranSec
Date Reserved
2026-03-09T18:20:23.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d4aef4197a8e3ba0b58d

Added to database: 3/24/2026, 12:02:54 AM

Last enriched: 3/24/2026, 12:12:44 AM

Last updated: 3/24/2026, 1:10:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses