CVE-2025-6102

8.8 HIGH

📋 TL;DR

This critical vulnerability in Wifi-soft UniBox Controller allows remote attackers to execute arbitrary operating system commands via command injection in the logout.php file's mac_address parameter. Attackers can gain full control of affected systems without authentication. All users running vulnerable versions are at risk.

💻 Affected Systems

Products:
  • Wifi-soft UniBox Controller
Versions: Up to and including 20250506
Operating Systems: Likely Linux-based systems running the controller
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in default configurations and requires no special settings to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal data, pivot to other systems, or establish persistent backdoors.

🟠

Likely Case

Remote code execution leading to system takeover, data exfiltration, or deployment of ransomware/cryptominers.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available, making this easily weaponizable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider workarounds or alternative solutions.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests containing shell metacharacters in the mac_address parameter

# Example ModSecurity rule: SecRule ARGS:mac_address "[;|&`$()]" "deny,status:403,id:1001"

Network Access Control

linux

Restrict access to the UniBox Controller management interface

# Example iptables rule: iptables -A INPUT -p tcp --dport [controller-port] -s [trusted-ips] -j ACCEPT
# iptables -A INPUT -p tcp --dport [controller-port] -j DROP

🧯 If You Can't Patch

  • Isolate the UniBox Controller on a dedicated VLAN with strict firewall rules
  • Implement network-based intrusion detection to monitor for command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check if running UniBox Controller version 20250506 or earlier. Test by sending a request to /authentication/logout.php with mac_address parameter containing shell metacharacters (monitor system response).

Check Version:

Check controller web interface or configuration files for version information

Verify Fix Applied:

Test with the same exploit payloads after implementing workarounds - should receive error or blocked response instead of command execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /authentication/logout.php with shell metacharacters in parameters
  • Unexpected system commands executed from web server process

Network Indicators:

  • HTTP requests containing shell metacharacters like ;, |, &, `, $, (, ) in URL parameters
  • Outbound connections from controller to unexpected destinations

SIEM Query:

source="web_server" AND (url="/authentication/logout.php" AND (param="*;*" OR param="*|*" OR param="*&*" OR param="*`*" OR param="*$(*"))

🔗 References

📤 Share & Export