CVE-2025-2732

8.0 HIGH

📋 TL;DR

This critical vulnerability in H3C Magic routers allows authenticated attackers on the local network to execute arbitrary commands via command injection in the /api/wizard/getWifiNeighbour endpoint. Affected users include anyone using H3C Magic NX15, NX30 Pro, NX400, R3010, or BE18000 routers with firmware up to V100R014.

💻 Affected Systems

Products:
  • H3C Magic NX15
  • H3C Magic NX30 Pro
  • H3C Magic NX400
  • H3C Magic R3010
  • H3C Magic BE18000
Versions: Up to V100R014
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires HTTP POST access to the vulnerable endpoint, typically available to authenticated users on the local network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to install persistent backdoors, intercept all network traffic, pivot to other internal systems, or brick the device.

🟠

Likely Case

Attacker gains full control of router to modify network settings, intercept credentials, or use as pivot point for internal network attacks.

🟢

If Mitigated

Limited impact due to network segmentation, but still allows router compromise within its segment.

🌐 Internet-Facing: LOW - Attack requires local network access according to description.
🏢 Internal Only: HIGH - Local network access is sufficient for exploitation, making internal threats significant.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly disclosed on GitHub. Attack requires local network access and likely authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after V100R014

Vendor Advisory: https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/

Restart Required: Yes

Instructions:

1. Visit H3C support site. 2. Download latest firmware for your model. 3. Upload via router admin interface. 4. Apply update and restart router.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Use router firewall rules to block access to /api/wizard/getWifiNeighbour endpoint

Network segmentation

all

Isolate router management interface to dedicated VLAN

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach router management interface
  • Monitor for suspicious POST requests to /api/wizard/getWifiNeighbour endpoint

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is V100R014 or earlier, device is vulnerable.

Check Version:

Check via router web interface or SSH: show version (if available)

Verify Fix Applied:

Verify firmware version is newer than V100R014 after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /api/wizard/getWifiNeighbour
  • Command execution patterns in router logs
  • Multiple failed authentication attempts followed by successful POST

Network Indicators:

  • POST requests to router IP on port 80/443 with command injection patterns in payload
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (uri="/api/wizard/getWifiNeighbour" OR cmd="*;*" OR cmd="*|*" OR cmd="*`*" OR cmd="*$(*")

🔗 References

📤 Share & Export