CVE-2025-5145

6.3 MEDIUM

📋 TL;DR

A critical command injection vulnerability in Netcore networking devices allows remote attackers to execute arbitrary commands on affected systems. This affects multiple Netcore router and access point models through manipulation of query strings in the web interface's CGI handler. Organizations using these devices are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Netcore NBR1005GPEV2
  • Netcore B6V2
  • Netcore COVER5
  • Netcore NAP830
  • Netcore NAP930
  • Netcore NBR100V2
  • Netcore NBR200V2
  • Netcore POWER13
Versions: All versions up to 20250508
Operating Systems: Embedded Linux/network OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface's CGI component at /www/cgi-bin/

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to persistent backdoor installation, data exfiltration, network pivoting, and device bricking.

🟠

Likely Case

Unauthenticated remote code execution allowing attacker to gain shell access, modify configurations, and use device as pivot point.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Exploit is remote and unauthenticated, making internet-facing devices immediate targets.
🏢 Internal Only: MEDIUM - Internal devices still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub, making trivial exploitation possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Netcore vendor website for firmware updates
2. Download latest firmware for your specific model
3. Backup current configuration
4. Upload and apply firmware update via web interface
5. Restart device
6. Restore configuration if needed

🔧 Temporary Workarounds

Disable web management interface

all

Disable the vulnerable CGI web interface if not required for management

Specific commands vary by model - consult device documentation

Network access control

linux

Restrict access to management interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules
  • Implement network monitoring and IDS/IPS rules to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version date is 20250508 or earlier, device is vulnerable.

Check Version:

curl -k https://device-ip/status.cgi | grep version

Verify Fix Applied:

Verify firmware version shows date after 20250508 and test with known safe payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CGI process execution
  • Suspicious commands in web logs
  • Multiple failed login attempts followed by successful command execution

Network Indicators:

  • HTTP requests to /www/cgi-bin/ with command injection patterns
  • Outbound connections from device to unknown IPs

SIEM Query:

source="web_logs" AND uri="/www/cgi-bin/*" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export