CVE-2025-24306

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in +F FS010M devices that allows authenticated administrators to execute arbitrary operating system commands. Attackers with administrative access can exploit this to run malicious commands on the affected device. Only +F FS010M devices running versions before V2.0.0_1101 are affected.

💻 Affected Systems

Products:
  • +F FS010M
Versions: All versions prior to V2.0.0_1101
Operating Systems: Embedded OS specific to +F FS010M
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative authentication to exploit. Default admin credentials increase risk if unchanged.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to other network systems, or render the device inoperable.

🟠

Likely Case

Attackers with stolen or compromised admin credentials execute commands to gain persistent access, modify configurations, or disrupt device functionality.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected device only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials but is straightforward once authenticated. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.0.0_1101

Vendor Advisory: https://fsi-plusf.jp/news/25031701.html

Restart Required: Yes

Instructions:

1. Download firmware version V2.0.0_1101 from vendor website. 2. Backup current configuration. 3. Upload and install the new firmware through the device's web interface. 4. Reboot the device. 5. Verify the firmware version is updated.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to trusted IP addresses only and use strong, unique credentials.

Network Segmentation

all

Isolate the FS010M device in a separate network segment with strict firewall rules.

🧯 If You Can't Patch

  • Implement strict network access controls to limit device exposure
  • Monitor for suspicious administrative login attempts and command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the device's web interface under System Information or Settings.

Check Version:

No CLI command available. Check via web interface at System > Firmware Version.

Verify Fix Applied:

Confirm the firmware version shows V2.0.0_1101 or later in the device's web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Unexpected command execution in system logs
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from the device
  • Traffic to unexpected ports or IP addresses

SIEM Query:

source="fs010m" AND (event_type="admin_login" OR event_type="command_exec") | stats count by src_ip, user

🔗 References

📤 Share & Export