CVE-2025-22962

7.2 HIGH

📋 TL;DR

A critical remote code execution vulnerability in GatesAir Maxiva UAXT/VAXT transmitters allows authenticated attackers to execute arbitrary commands via crafted POST requests to the /json endpoint when debugging mode is enabled. This affects organizations using these broadcast transmitters with web management interfaces exposed. Attackers can achieve full system compromise.

💻 Affected Systems

Products:
  • GatesAir Maxiva UAXT
  • GatesAir Maxiva VAXT
Versions: All versions with debugging mode capability
Operating Systems: Embedded Linux-based transmitter OS
Default Config Vulnerable: ✅ No
Notes: Vulnerability only exploitable when debugging mode is enabled. Default configurations may have debugging disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device takeover leading to transmitter control disruption, unauthorized broadcast content injection, privilege escalation to root, and lateral movement to other network systems.

🟠

Likely Case

Unauthorized access to transmitter configuration, data exfiltration, service disruption, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact if debugging mode is disabled and proper network segmentation is implemented, though authenticated users could still exploit if debugging is accidentally enabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires valid session ID (sess_id) and debugging mode enabled. Attack involves crafting POST requests to /json endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with GatesAir for specific patched versions

Vendor Advisory: https://www.gatesair.com/support/security-advisories

Restart Required: No

Instructions:

1. Contact GatesAir support for latest firmware updates. 2. Apply firmware patch provided by vendor. 3. Verify debugging mode remains disabled after update.

🔧 Temporary Workarounds

Disable Debugging Mode

all

Disable debugging functionality in transmitter web interface to prevent exploitation

Access web interface > System Settings > Debugging > Disable

Network Segmentation

all

Isolate transmitter management interfaces from untrusted networks

Configure firewall rules to restrict access to transmitter IP:port from authorized management stations only

🧯 If You Can't Patch

  • Ensure debugging mode is permanently disabled in all transmitter configurations
  • Implement strict network access controls and monitor for unauthorized access attempts to /json endpoint

🔍 How to Verify

Check if Vulnerable:

Check if debugging mode is enabled in web interface and verify firmware version against vendor advisory

Check Version:

Check web interface System Information page or use vendor-specific CLI commands

Verify Fix Applied:

Confirm debugging mode is disabled and firmware version matches patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /json endpoint
  • Multiple failed authentication attempts followed by successful sess_id usage
  • Commands execution logs from transmitter system

Network Indicators:

  • Unusual traffic patterns to transmitter management interface
  • POST requests with command injection patterns to /json endpoint

SIEM Query:

source="transmitter_logs" AND (url_path="/json" OR message="debugging" OR message="command execution")

🔗 References

📤 Share & Export